dblp.uni-trier.dewww.uni-trier.de

John Kelsey

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
39EEPraveen Gauravaram, John Kelsey: Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. CT-RSA 2008: 36-51
38EEElena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer: Second Preimage Attacks on Dithered Hash Functions. EUROCRYPT 2008: 270-288
2006
37EEJohn Kelsey, Tadayoshi Kohno: Herding Hash Functions and the Nostradamus Attack. EUROCRYPT 2006: 183-200
36EEJohn Kelsey, Stefan Lucks: Collisions and Near-Collisions for Reduced-Round Tiger. FSE 2006: 111-125
2005
35EEJohn Kelsey, Bruce Schneier: Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. EUROCRYPT 2005: 474-490
2003
34EENiels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346
2002
33EEJohn Kelsey: Compression and Information Leakage of Plaintext. FSE 2002: 263-276
2000
32 John Kelsey, Bruce Schneier: MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. AES Candidate Conference 2000: 169-185
31 Tadayoshi Kohno, John Kelsey, Bruce Schneier: Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211
30 Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Niels Ferguson: Comments on Twofish as an AES Candidate. AES Candidate Conference 2000: 355-356
29EENiels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting: Improved Cryptanalysis of Rijndael. FSE 2000: 213-230
28EEJohn Kelsey, Tadayoshi Kohno, Bruce Schneier: Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93
27 John Kelsey, Bruce Schneier, David Wagner, Chris Hall: Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security 8(2/3): (2000)
1999
26EEJohn Kelsey, Bruce Schneier, David Wagner: Mod n Cryptanalysis, with Applications Against RC5P and M6. FSE 1999: 139-155
25EEJohn Kelsey, Bruce Schneier: Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. Recent Advances in Intrusion Detection 1999
24EEJohn Kelsey, Bruce Schneier: Key-Schedule Cryptanalysis of DEAL. Selected Areas in Cryptography 1999: 118-134
23EEJohn Kelsey, Bruce Schneier, Niels Ferguson: Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. Selected Areas in Cryptography 1999: 13-33
22EEBruce Schneier, John Kelsey: Secure Audit Logs to Support Computer Forensics. ACM Trans. Inf. Syst. Secur. 2(2): 159-176 (1999)
21EEJohn Kelsey, Bruce Schneier: The Street Performer Protocol and Digital Copyrights. First Monday 4(6): (1999)
1998
20 John Kelsey, Bruce Schneier: Secure Authentication with Multiple Parallel Keys. CARDIS 1998: 150-156
19EEChris Hall, David Wagner, John Kelsey, Bruce Schneier: Building PRFs from PRPs. CRYPTO 1998: 370-389
18EEJohn Kelsey, Bruce Schneier, David Wagner, Chris Hall: Side Channel Cryptanalysis of Product Ciphers. ESORICS 1998: 97-110
17EEJohn Kelsey, Bruce Schneier, David Wagner, Chris Hall: Cryptanalytic Attacks on Pseudorandom Number Generators. FSE 1998: 168-188
16EEDon Coppersmith, David Wagner, Bruce Schneier, John Kelsey: Cryptanalysis of TWOPRIME. FSE 1998: 32-48
15EEChris Hall, John Kelsey, Bruce Schneier, David Wagner: Cryptanalysis of SPEED. Financial Cryptography 1998: 309-310
14EEBruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall: On the Twofish Key Schedule. Selected Areas in Cryptography 1998: 27-42
13EEDavid Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier: Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305
12EEChris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner: Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338
1997
11EEJohn Kelsey, Bruce Schneier: Conditional Purchase Orders. ACM Conference on Computer and Communications Security 1997: 117-124
10EEDavid Wagner, Bruce Schneier, John Kelsey: Cryptoanalysis of the Cellular Encryption Algorithm. CRYPTO 1997: 526-537
9 John Kelsey, Bruce Schneier, David Wagner: Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. ICICS 1997: 233-246
8 John Kelsey, Bruce Schneier, Chris Hall, David Wagner: Secure Applications of Low-Entropy Keys. ISW 1997: 121-134
7 John Kelsey, Bruce Schneier, David Wagner: Protocol Interactions and the Chosen Protocol Attack. Security Protocols Workshop 1997: 91-104
1996
6EEJohn Kelsey, Bruce Schneier, Chris Hall: An Authenticated Camera. ACSAC 1996: 24-31
5 Bruce Schneier, John Kelsey: Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. CARDIS 1996
4EEJohn Kelsey, Bruce Schneier, David Wagner: Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. CRYPTO 1996: 237-251
3EEBruce Schneier, John Kelsey, Jay Walker: Distributed Proctoring. ESORICS 1996: 172-182
2 Bruce Schneier, John Kelsey: Unbalanced Feistel Networks and Block Cipher Design. FSE 1996: 121-144
1 Bruce Schneier, John Kelsey: Automatic Event-Stream Notarization Using Digital Signatures. Security Protocols Workshop 1996: 155-169

Coauthor Index

1Elena Andreeva [38]
2Charles Bouillaguet [38]
3Don Coppersmith [16]
4Ed Dawson [13]
5Niels Ferguson [23] [29] [30] [34]
6Pierre-Alain Fouque [38]
7Praveen Gauravaram [39]
8Chris Hall [6] [8] [12] [14] [15] [17] [18] [19] [27]
9Jonathan J. Hoch [38]
10Tadayoshi Kohno [28] [31] [34] [37]
11Stefan Lucks [29] [34] [36]
12William Millan [13]
13Vincent Rijmen [12]
14Bruce Schneier [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [34] [35]
15Adi Shamir [38]
16Leone Simpson [13]
17Michael Stay [29]
18David Wagner [4] [7] [8] [9] [10] [12] [13] [14] [15] [16] [17] [18] [19] [26] [27] [29] [30]
19Jay Walker [3]
20Doug Whiting [14] [29] [30] [34]
21Sébastien Zimmer [38]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)