The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John Kelsey: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Kelsey, Bruce Schneier, Chris Hall
    An Authenticated Camera. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:24-31 [Conf]
  2. John Kelsey, Bruce Schneier
    MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:169-185 [Conf]
  3. Tadayoshi Kohno, John Kelsey, Bruce Schneier
    Preliminary Cryptanalysis of Reduced-Round Serpent. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:195-211 [Conf]
  4. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Niels Ferguson
    Comments on Twofish as an AES Candidate. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:355-356 [Conf]
  5. John Kelsey, Bruce Schneier
    Secure Authentication with Multiple Parallel Keys. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:150-156 [Conf]
  6. Bruce Schneier, John Kelsey
    Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  7. John Kelsey, Bruce Schneier
    Conditional Purchase Orders. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:117-124 [Conf]
  8. Chris Hall, David Wagner, John Kelsey, Bruce Schneier
    Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:370-389 [Conf]
  9. John Kelsey, Bruce Schneier, David Wagner
    Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:237-251 [Conf]
  10. David Wagner, Bruce Schneier, John Kelsey
    Cryptoanalysis of the Cellular Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:526-537 [Conf]
  11. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:97-110 [Conf]
  12. Bruce Schneier, John Kelsey, Jay Walker
    Distributed Proctoring. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:172-182 [Conf]
  13. John Kelsey, Tadayoshi Kohno
    Herding Hash Functions and the Nostradamus Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:183-200 [Conf]
  14. John Kelsey, Bruce Schneier
    Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:474-490 [Conf]
  15. Chris Hall, John Kelsey, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:309-310 [Conf]
  16. Don Coppersmith, David Wagner, Bruce Schneier, John Kelsey
    Cryptanalysis of TWOPRIME. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:32-48 [Conf]
  17. Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting
    Improved Cryptanalysis of Rijndael. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:213-230 [Conf]
  18. Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno
    Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:330-346 [Conf]
  19. John Kelsey
    Compression and Information Leakage of Plaintext. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:263-276 [Conf]
  20. John Kelsey, Tadayoshi Kohno, Bruce Schneier
    Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:75-93 [Conf]
  21. John Kelsey, Bruce Schneier, David Wagner
    Mod n Cryptanalysis, with Applications Against RC5P and M6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:139-155 [Conf]
  22. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:168-188 [Conf]
  23. Bruce Schneier, John Kelsey
    Unbalanced Feistel Networks and Block Cipher Design. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:121-144 [Conf]
  24. John Kelsey, Stefan Lucks
    Collisions and Near-Collisions for Reduced-Round Tiger. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:111-125 [Conf]
  25. John Kelsey, Bruce Schneier, David Wagner
    Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:233-246 [Conf]
  26. John Kelsey, Bruce Schneier, Chris Hall, David Wagner
    Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:121-134 [Conf]
  27. John Kelsey, Bruce Schneier
    Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  28. John Kelsey, Bruce Schneier
    Key-Schedule Cryptanalysis of DEAL. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:118-134 [Conf]
  29. John Kelsey, Bruce Schneier, Niels Ferguson
    Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:13-33 [Conf]
  30. Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:319-338 [Conf]
  31. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall
    On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:27-42 [Conf]
  32. David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
    Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
  33. John Kelsey, Bruce Schneier, David Wagner
    Protocol Interactions and the Chosen Protocol Attack. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:91-104 [Conf]
  34. Bruce Schneier, John Kelsey
    Automatic Event-Stream Notarization Using Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:155-169 [Conf]
  35. John Kelsey, Bruce Schneier
    The Street Performer Protocol and Digital Copyrights. [Citation Graph (0, 0)][DBLP]
    First Monday, 1999, v:4, n:6, pp:- [Journal]
  36. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  37. Bruce Schneier, John Kelsey
    Secure Audit Logs to Support Computer Forensics. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:159-176 [Journal]

  38. Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. [Citation Graph (, )][DBLP]


  39. Second Preimage Attacks on Dithered Hash Functions. [Citation Graph (, )][DBLP]


  40. Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. [Citation Graph (, )][DBLP]


  41. Attacking Paper-Based E2E Voting Systems. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002