|
Search the dblp DataBase
Chris Hall:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chris Hall, Bruce Schneier
Remote Electronic Gambling. [Citation Graph (0, 0)][DBLP] ACSAC, 1997, pp:232-238 [Conf]
- John Kelsey, Bruce Schneier, Chris Hall
An Authenticated Camera. [Citation Graph (0, 0)][DBLP] ACSAC, 1996, pp:24-31 [Conf]
- Bruce Schneier, Chris Hall
An Improved E-Mail Security Protocol. [Citation Graph (0, 0)][DBLP] ACSAC, 1997, pp:227-0 [Conf]
- Chris Hall, David Wagner, John Kelsey, Bruce Schneier
Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:370-389 [Conf]
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall
Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:97-110 [Conf]
- Chris Hall, John Kelsey, Bruce Schneier, David Wagner
Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1998, pp:309-310 [Conf]
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall
Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1998, pp:168-188 [Conf]
- Chris Hall, Ian Goldberg, Bruce Schneier
Reaction Attacks against several Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:2-12 [Conf]
- John Kelsey, Bruce Schneier, Chris Hall, David Wagner
Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:121-134 [Conf]
- Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner
Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:319-338 [Conf]
- Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall
On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:27-42 [Conf]
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall
Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
- Chris Hall, Dar-Jen Chang, Ahmed Desoky
Client/ Server Application for the Analysis of Gene Expressions. [Citation Graph (0, 0)][DBLP] ISCA Conference on Intelligent Systems, 2002, pp:191-196 [Conf]
- Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier
Protecting secret keys with personal entropy. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2000, v:16, n:4, pp:311-318 [Journal]
Search in 0.008secs, Finished in 0.009secs
|