|
Search the dblp DataBase
John Kelsey:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- John Kelsey, Bruce Schneier, Chris Hall
An Authenticated Camera. [Citation Graph (0, 0)][DBLP] ACSAC, 1996, pp:24-31 [Conf]
- John Kelsey, Bruce Schneier
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:169-185 [Conf]
- Tadayoshi Kohno, John Kelsey, Bruce Schneier
Preliminary Cryptanalysis of Reduced-Round Serpent. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:195-211 [Conf]
- Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Niels Ferguson
Comments on Twofish as an AES Candidate. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:355-356 [Conf]
- John Kelsey, Bruce Schneier
Secure Authentication with Multiple Parallel Keys. [Citation Graph (0, 0)][DBLP] CARDIS, 1998, pp:150-156 [Conf]
- Bruce Schneier, John Kelsey
Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. [Citation Graph (0, 0)][DBLP] CARDIS, 1996, pp:- [Conf]
- John Kelsey, Bruce Schneier
Conditional Purchase Orders. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1997, pp:117-124 [Conf]
- Chris Hall, David Wagner, John Kelsey, Bruce Schneier
Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:370-389 [Conf]
- John Kelsey, Bruce Schneier, David Wagner
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. [Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:237-251 [Conf]
- David Wagner, Bruce Schneier, John Kelsey
Cryptoanalysis of the Cellular Encryption Algorithm. [Citation Graph (0, 0)][DBLP] CRYPTO, 1997, pp:526-537 [Conf]
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall
Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:97-110 [Conf]
- Bruce Schneier, John Kelsey, Jay Walker
Distributed Proctoring. [Citation Graph (0, 0)][DBLP] ESORICS, 1996, pp:172-182 [Conf]
- John Kelsey, Tadayoshi Kohno
Herding Hash Functions and the Nostradamus Attack. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:183-200 [Conf]
- John Kelsey, Bruce Schneier
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:474-490 [Conf]
- Chris Hall, John Kelsey, Bruce Schneier, David Wagner
Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1998, pp:309-310 [Conf]
- Don Coppersmith, David Wagner, Bruce Schneier, John Kelsey
Cryptanalysis of TWOPRIME. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1998, pp:32-48 [Conf]
- Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting
Improved Cryptanalysis of Rijndael. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:213-230 [Conf]
- Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:330-346 [Conf]
- John Kelsey
Compression and Information Leakage of Plaintext. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:263-276 [Conf]
- John Kelsey, Tadayoshi Kohno, Bruce Schneier
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:75-93 [Conf]
- John Kelsey, Bruce Schneier, David Wagner
Mod n Cryptanalysis, with Applications Against RC5P and M6. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:139-155 [Conf]
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall
Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1998, pp:168-188 [Conf]
- Bruce Schneier, John Kelsey
Unbalanced Feistel Networks and Block Cipher Design. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1996, pp:121-144 [Conf]
- John Kelsey, Stefan Lucks
Collisions and Near-Collisions for Reduced-Round Tiger. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:111-125 [Conf]
- John Kelsey, Bruce Schneier, David Wagner
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:233-246 [Conf]
- John Kelsey, Bruce Schneier, Chris Hall, David Wagner
Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:121-134 [Conf]
- John Kelsey, Bruce Schneier
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
- John Kelsey, Bruce Schneier
Key-Schedule Cryptanalysis of DEAL. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:118-134 [Conf]
- John Kelsey, Bruce Schneier, Niels Ferguson
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:13-33 [Conf]
- Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner
Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:319-338 [Conf]
- Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall
On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:27-42 [Conf]
- David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
- John Kelsey, Bruce Schneier, David Wagner
Protocol Interactions and the Chosen Protocol Attack. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1997, pp:91-104 [Conf]
- Bruce Schneier, John Kelsey
Automatic Event-Stream Notarization Using Digital Signatures. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1996, pp:155-169 [Conf]
- John Kelsey, Bruce Schneier
The Street Performer Protocol and Digital Copyrights. [Citation Graph (0, 0)][DBLP] First Monday, 1999, v:4, n:6, pp:- [Journal]
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall
Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
- Bruce Schneier, John Kelsey
Secure Audit Logs to Support Computer Forensics. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:159-176 [Journal]
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. [Citation Graph (, )][DBLP]
Second Preimage Attacks on Dithered Hash Functions. [Citation Graph (, )][DBLP]
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. [Citation Graph (, )][DBLP]
Attacking Paper-Based E2E Voting Systems. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|