The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chris Hall: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chris Hall, Bruce Schneier
    Remote Electronic Gambling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:232-238 [Conf]
  2. John Kelsey, Bruce Schneier, Chris Hall
    An Authenticated Camera. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:24-31 [Conf]
  3. Bruce Schneier, Chris Hall
    An Improved E-Mail Security Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:227-0 [Conf]
  4. Chris Hall, David Wagner, John Kelsey, Bruce Schneier
    Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:370-389 [Conf]
  5. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:97-110 [Conf]
  6. Chris Hall, John Kelsey, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:309-310 [Conf]
  7. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:168-188 [Conf]
  8. Chris Hall, Ian Goldberg, Bruce Schneier
    Reaction Attacks against several Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:2-12 [Conf]
  9. John Kelsey, Bruce Schneier, Chris Hall, David Wagner
    Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:121-134 [Conf]
  10. Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:319-338 [Conf]
  11. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall
    On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:27-42 [Conf]
  12. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  13. Chris Hall, Dar-Jen Chang, Ahmed Desoky
    Client/ Server Application for the Analysis of Gene Expressions. [Citation Graph (0, 0)][DBLP]
    ISCA Conference on Intelligent Systems, 2002, pp:191-196 [Conf]
  14. Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier
    Protecting secret keys with personal entropy. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:311-318 [Journal]

Search in 0.069secs, Finished in 0.070secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002