| 2002 |
| 14 | | Chris Hall,
Dar-Jen Chang,
Ahmed Desoky:
Client/ Server Application for the Analysis of Gene Expressions.
ISCA Conference on Intelligent Systems 2002: 191-196 |
| 2000 |
| 13 | EE | Carl M. Ellison,
Chris Hall,
Randy Milbert,
Bruce Schneier:
Protecting secret keys with personal entropy.
Future Generation Comp. Syst. 16(4): 311-318 (2000) |
| 12 | | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security 8(2/3): (2000) |
| 1999 |
| 11 | | Chris Hall,
Ian Goldberg,
Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems.
ICICS 1999: 2-12 |
| 1998 |
| 10 | EE | Chris Hall,
David Wagner,
John Kelsey,
Bruce Schneier:
Building PRFs from PRPs.
CRYPTO 1998: 370-389 |
| 9 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
ESORICS 1998: 97-110 |
| 8 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators.
FSE 1998: 168-188 |
| 7 | EE | Chris Hall,
John Kelsey,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Financial Cryptography 1998: 309-310 |
| 6 | EE | Bruce Schneier,
John Kelsey,
Doug Whiting,
David Wagner,
Chris Hall:
On the Twofish Key Schedule.
Selected Areas in Cryptography 1998: 27-42 |
| 5 | EE | Chris Hall,
John Kelsey,
Vincent Rijmen,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Selected Areas in Cryptography 1998: 319-338 |
| 1997 |
| 4 | EE | Bruce Schneier,
Chris Hall:
An Improved E-Mail Security Protocol.
ACSAC 1997: 227- |
| 3 | EE | Chris Hall,
Bruce Schneier:
Remote Electronic Gambling.
ACSAC 1997: 232-238 |
| 2 | | John Kelsey,
Bruce Schneier,
Chris Hall,
David Wagner:
Secure Applications of Low-Entropy Keys.
ISW 1997: 121-134 |
| 1996 |
| 1 | EE | John Kelsey,
Bruce Schneier,
Chris Hall:
An Authenticated Camera.
ACSAC 1996: 24-31 |