2002 |
14 | | Chris Hall,
Dar-Jen Chang,
Ahmed Desoky:
Client/ Server Application for the Analysis of Gene Expressions.
ISCA Conference on Intelligent Systems 2002: 191-196 |
2000 |
13 | EE | Carl M. Ellison,
Chris Hall,
Randy Milbert,
Bruce Schneier:
Protecting secret keys with personal entropy.
Future Generation Comp. Syst. 16(4): 311-318 (2000) |
12 | | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security 8(2/3): (2000) |
1999 |
11 | | Chris Hall,
Ian Goldberg,
Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems.
ICICS 1999: 2-12 |
1998 |
10 | EE | Chris Hall,
David Wagner,
John Kelsey,
Bruce Schneier:
Building PRFs from PRPs.
CRYPTO 1998: 370-389 |
9 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
ESORICS 1998: 97-110 |
8 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators.
FSE 1998: 168-188 |
7 | EE | Chris Hall,
John Kelsey,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Financial Cryptography 1998: 309-310 |
6 | EE | Bruce Schneier,
John Kelsey,
Doug Whiting,
David Wagner,
Chris Hall:
On the Twofish Key Schedule.
Selected Areas in Cryptography 1998: 27-42 |
5 | EE | Chris Hall,
John Kelsey,
Vincent Rijmen,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Selected Areas in Cryptography 1998: 319-338 |
1997 |
4 | EE | Bruce Schneier,
Chris Hall:
An Improved E-Mail Security Protocol.
ACSAC 1997: 227- |
3 | EE | Chris Hall,
Bruce Schneier:
Remote Electronic Gambling.
ACSAC 1997: 232-238 |
2 | | John Kelsey,
Bruce Schneier,
Chris Hall,
David Wagner:
Secure Applications of Low-Entropy Keys.
ISW 1997: 121-134 |
1996 |
1 | EE | John Kelsey,
Bruce Schneier,
Chris Hall:
An Authenticated Camera.
ACSAC 1996: 24-31 |