2008 |
39 | EE | Praveen Gauravaram,
John Kelsey:
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks.
CT-RSA 2008: 36-51 |
38 | EE | Elena Andreeva,
Charles Bouillaguet,
Pierre-Alain Fouque,
Jonathan J. Hoch,
John Kelsey,
Adi Shamir,
Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions.
EUROCRYPT 2008: 270-288 |
2006 |
37 | EE | John Kelsey,
Tadayoshi Kohno:
Herding Hash Functions and the Nostradamus Attack.
EUROCRYPT 2006: 183-200 |
36 | EE | John Kelsey,
Stefan Lucks:
Collisions and Near-Collisions for Reduced-Round Tiger.
FSE 2006: 111-125 |
2005 |
35 | EE | John Kelsey,
Bruce Schneier:
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work.
EUROCRYPT 2005: 474-490 |
2003 |
34 | EE | Niels Ferguson,
Doug Whiting,
Bruce Schneier,
John Kelsey,
Stefan Lucks,
Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
FSE 2003: 330-346 |
2002 |
33 | EE | John Kelsey:
Compression and Information Leakage of Plaintext.
FSE 2002: 263-276 |
2000 |
32 | | John Kelsey,
Bruce Schneier:
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants.
AES Candidate Conference 2000: 169-185 |
31 | | Tadayoshi Kohno,
John Kelsey,
Bruce Schneier:
Preliminary Cryptanalysis of Reduced-Round Serpent.
AES Candidate Conference 2000: 195-211 |
30 | | Bruce Schneier,
John Kelsey,
Doug Whiting,
David Wagner,
Niels Ferguson:
Comments on Twofish as an AES Candidate.
AES Candidate Conference 2000: 355-356 |
29 | EE | Niels Ferguson,
John Kelsey,
Stefan Lucks,
Bruce Schneier,
Michael Stay,
David Wagner,
Doug Whiting:
Improved Cryptanalysis of Rijndael.
FSE 2000: 213-230 |
28 | EE | John Kelsey,
Tadayoshi Kohno,
Bruce Schneier:
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
FSE 2000: 75-93 |
27 | | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security 8(2/3): (2000) |
1999 |
26 | EE | John Kelsey,
Bruce Schneier,
David Wagner:
Mod n Cryptanalysis, with Applications Against RC5P and M6.
FSE 1999: 139-155 |
25 | EE | John Kelsey,
Bruce Schneier:
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Recent Advances in Intrusion Detection 1999 |
24 | EE | John Kelsey,
Bruce Schneier:
Key-Schedule Cryptanalysis of DEAL.
Selected Areas in Cryptography 1999: 118-134 |
23 | EE | John Kelsey,
Bruce Schneier,
Niels Ferguson:
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.
Selected Areas in Cryptography 1999: 13-33 |
22 | EE | Bruce Schneier,
John Kelsey:
Secure Audit Logs to Support Computer Forensics.
ACM Trans. Inf. Syst. Secur. 2(2): 159-176 (1999) |
21 | EE | John Kelsey,
Bruce Schneier:
The Street Performer Protocol and Digital Copyrights.
First Monday 4(6): (1999) |
1998 |
20 | | John Kelsey,
Bruce Schneier:
Secure Authentication with Multiple Parallel Keys.
CARDIS 1998: 150-156 |
19 | EE | Chris Hall,
David Wagner,
John Kelsey,
Bruce Schneier:
Building PRFs from PRPs.
CRYPTO 1998: 370-389 |
18 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
ESORICS 1998: 97-110 |
17 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators.
FSE 1998: 168-188 |
16 | EE | Don Coppersmith,
David Wagner,
Bruce Schneier,
John Kelsey:
Cryptanalysis of TWOPRIME.
FSE 1998: 32-48 |
15 | EE | Chris Hall,
John Kelsey,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Financial Cryptography 1998: 309-310 |
14 | EE | Bruce Schneier,
John Kelsey,
Doug Whiting,
David Wagner,
Chris Hall:
On the Twofish Key Schedule.
Selected Areas in Cryptography 1998: 27-42 |
13 | EE | David Wagner,
Leone Simpson,
Ed Dawson,
John Kelsey,
William Millan,
Bruce Schneier:
Cryptanalysis of ORYX.
Selected Areas in Cryptography 1998: 296-305 |
12 | EE | Chris Hall,
John Kelsey,
Vincent Rijmen,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Selected Areas in Cryptography 1998: 319-338 |
1997 |
11 | EE | John Kelsey,
Bruce Schneier:
Conditional Purchase Orders.
ACM Conference on Computer and Communications Security 1997: 117-124 |
10 | EE | David Wagner,
Bruce Schneier,
John Kelsey:
Cryptoanalysis of the Cellular Encryption Algorithm.
CRYPTO 1997: 526-537 |
9 | | John Kelsey,
Bruce Schneier,
David Wagner:
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
ICICS 1997: 233-246 |
8 | | John Kelsey,
Bruce Schneier,
Chris Hall,
David Wagner:
Secure Applications of Low-Entropy Keys.
ISW 1997: 121-134 |
7 | | John Kelsey,
Bruce Schneier,
David Wagner:
Protocol Interactions and the Chosen Protocol Attack.
Security Protocols Workshop 1997: 91-104 |
1996 |
6 | EE | John Kelsey,
Bruce Schneier,
Chris Hall:
An Authenticated Camera.
ACSAC 1996: 24-31 |
5 | | Bruce Schneier,
John Kelsey:
Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor.
CARDIS 1996 |
4 | EE | John Kelsey,
Bruce Schneier,
David Wagner:
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
CRYPTO 1996: 237-251 |
3 | EE | Bruce Schneier,
John Kelsey,
Jay Walker:
Distributed Proctoring.
ESORICS 1996: 172-182 |
2 | | Bruce Schneier,
John Kelsey:
Unbalanced Feistel Networks and Block Cipher Design.
FSE 1996: 121-144 |
1 | | Bruce Schneier,
John Kelsey:
Automatic Event-Stream Notarization Using Digital Signatures.
Security Protocols Workshop 1996: 155-169 |