2008 |
90 | EE | Bruce Schneier:
The Psychology of Security.
AFRICACRYPT 2008: 50-79 |
89 | EE | Alexei Czeskis,
David J. St. Hilaire,
Karl Koscher,
Steven D. Gribble,
Tadayoshi Kohno,
Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
HotSec 2008 |
2007 |
88 | EE | Bruce Schneier:
The psychology of security.
Commun. ACM 50(5): 128 (2007) |
2005 |
87 | EE | John Kelsey,
Bruce Schneier:
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work.
EUROCRYPT 2005: 474-490 |
86 | EE | Bruce Schneier:
Solitaire.
Encyclopedia of Cryptography and Security 2005 |
85 | EE | Bruce Schneier:
Attack trends: 2004 and 2005.
ACM Queue 3(5): 52-53 (2005) |
84 | EE | Bruce Schneier:
Two-factor authentication: too little, too late.
Commun. ACM 48(4): 136 (2005) |
83 | EE | Bruce Schneier:
Risks of third-party data.
Commun. ACM 48(5): 136 (2005) |
82 | EE | Ross J. Anderson,
Bruce Schneier:
Guest Editors' Introduction: Economics of Information Security.
IEEE Security & Privacy 3(1): 12-13 (2005) |
81 | EE | Bruce Schneier:
Authentication and Expiration.
IEEE Security & Privacy 3(1): 88 (2005) |
80 | EE | Bruce Schneier:
The Zotob Storm.
IEEE Security & Privacy 3(6): 96 (2005) |
2004 |
79 | EE | Bruce Schneier:
Sensible Authentication.
ACM Queue 1(10): 74-78 (2004) |
78 | EE | Bruce Schneier:
The nonsecurity of secrecy.
Commun. ACM 47(10): 120 (2004) |
77 | EE | Paul C. Kocher,
Bruce Schneier:
Insider risks in elections.
Commun. ACM 47(7): 104 (2004) |
76 | EE | Bruce Schneier:
Hacking the Business Climate for Network Security.
IEEE Computer 37(4): 87-89 (2004) |
75 | EE | Bruce Schneier:
Voting Security and Technology.
IEEE Security & Privacy 2(1): 84 (2004) |
74 | EE | Bruce Schneier:
Security and Compliance.
IEEE Security & Privacy 2(3): 96 (2004) |
73 | EE | Bruce Schneier:
Customers, Passwords, and Web Sites.
IEEE Security & Privacy 2(4): 88 (2004) |
72 | EE | Bruce Schneier:
SIMS: Solution, or Part of the Problem?
IEEE Security & Privacy 2(5): 88 (2004) |
2003 |
71 | EE | Niels Ferguson,
Doug Whiting,
Bruce Schneier,
John Kelsey,
Stefan Lucks,
Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
FSE 2003: 330-346 |
70 | EE | David L. Dill,
Bruce Schneier,
Barbara Simons:
Voting and technology: who gets to count your vote?
Commun. ACM 46(8): 29-31 (2003) |
69 | EE | Bruce Schneier:
We Are All Security Consumers.
IEEE Security & Privacy 1(1): 104 (2003) |
68 | EE | Bruce Schneier:
Locks and Full Disclosure.
IEEE Security & Privacy 1(2): 88 (2003) |
67 | EE | Bruce Schneier:
Guilty Until Proven Innocent?
IEEE Security & Privacy 1(3): 88, 87 (2003) |
66 | EE | Bruce Schneier:
The Speed of Security.
IEEE Security & Privacy 1(4): 96 (2003) |
65 | EE | Bruce Schneier:
Airplane Hackers.
IEEE Security & Privacy 1(6): 92 (2003) |
2002 |
64 | EE | Kahil Jallad,
Jonathan Katz,
Bruce Schneier:
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.
ISC 2002: 90-101 |
2001 |
63 | | Bruce Schneier:
Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings
Springer 2001 |
62 | | Stephan Somogyi,
Bruce Schneier:
The perils of port 80.
Commun. ACM 44(10): 168 (2001) |
61 | EE | Bruce Schneier:
Insurance and the computer industry.
Commun. ACM 44(3): 114-115 (2001) |
60 | EE | Bruce Schneier:
Cyber underwriters lab.
Commun. ACM 44(4): 128 (2001) |
59 | | Bruce Schneier:
Managed Security Monitoring: Network Security for the 21st Centur.
Computers & Security 20(6): 491-503 (2001) |
2000 |
58 | | Jean-Jacques Quisquater,
Bruce Schneier:
Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings
Springer 2000 |
57 | | Niels Ferguson,
Bruce Schneier,
David Wagner:
Security Weaknesses in a Randomized Stream Cipher.
ACISP 2000: 234-241 |
56 | | Bruce Schneier,
Doug Whiting:
A Performance Comparison of the Five AES Finalists.
AES Candidate Conference 2000: 123-135 |
55 | | John Kelsey,
Bruce Schneier:
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants.
AES Candidate Conference 2000: 169-185 |
54 | | Tadayoshi Kohno,
John Kelsey,
Bruce Schneier:
Preliminary Cryptanalysis of Reduced-Round Serpent.
AES Candidate Conference 2000: 195-211 |
53 | | Bruce Schneier,
John Kelsey,
Doug Whiting,
David Wagner,
Niels Ferguson:
Comments on Twofish as an AES Candidate.
AES Candidate Conference 2000: 355-356 |
52 | EE | Niels Ferguson,
John Kelsey,
Stefan Lucks,
Bruce Schneier,
Michael Stay,
David Wagner,
Doug Whiting:
Improved Cryptanalysis of Rijndael.
FSE 2000: 213-230 |
51 | EE | John Kelsey,
Tadayoshi Kohno,
Bruce Schneier:
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
FSE 2000: 75-93 |
50 | EE | Carl M. Ellison,
Bruce Schneier:
Risks of PKI: Secure Email.
Commun. ACM 43(1): 160 (2000) |
49 | EE | Bruce Schneier:
Semantic network attacks.
Commun. ACM 43(12): 168 (2000) |
48 | EE | Carl M. Ellison,
Bruce Schneier:
Risks of PKI: E-Commerce.
Commun. ACM 43(2): 152 (2000) |
47 | EE | Carl M. Ellison,
Chris Hall,
Randy Milbert,
Bruce Schneier:
Protecting secret keys with personal entropy.
Future Generation Comp. Syst. 16(4): 311-318 (2000) |
46 | | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security 8(2/3): (2000) |
1999 |
45 | EE | Bruce Schneier,
Mudge,
David Wagner:
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2).
CQRE 1999: 192-203 |
44 | EE | John Kelsey,
Bruce Schneier,
David Wagner:
Mod n Cryptanalysis, with Applications Against RC5P and M6.
FSE 1999: 139-155 |
43 | | Chris Hall,
Ian Goldberg,
Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems.
ICICS 1999: 2-12 |
42 | EE | John Kelsey,
Bruce Schneier:
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Recent Advances in Intrusion Detection 1999 |
41 | EE | John Kelsey,
Bruce Schneier:
Key-Schedule Cryptanalysis of DEAL.
Selected Areas in Cryptography 1999: 118-134 |
40 | EE | John Kelsey,
Bruce Schneier,
Niels Ferguson:
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.
Selected Areas in Cryptography 1999: 13-33 |
39 | EE | Bruce Schneier,
John Kelsey:
Secure Audit Logs to Support Computer Forensics.
ACM Trans. Inf. Syst. Secur. 2(2): 159-176 (1999) |
38 | EE | Bruce Schneier:
Risks of Relying on Cryptography.
Commun. ACM 42(10): 144 (1999) |
37 | EE | Bruce Schneier:
The Uses and Abuses of Biometrics.
Commun. ACM 42(8): 136 (1999) |
36 | EE | Bruce Schneier:
The Trojan Horse Race.
Commun. ACM 42(9): 128 (1999) |
35 | EE | John Kelsey,
Bruce Schneier:
The Street Performer Protocol and Digital Copyrights.
First Monday 4(6): (1999) |
34 | EE | Bruce Schneier:
Cryptography: The Importance of Not Being Different.
IEEE Computer 32(3): 108-109 (1999) |
1998 |
33 | EE | Bruce Schneier,
Mudge:
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP).
ACM Conference on Computer and Communications Security 1998: 132-141 |
32 | EE | Bruce Schneier,
James Riordan:
A Certified E-Mail Protocol.
ACSAC 1998: 347-352 |
31 | | John Kelsey,
Bruce Schneier:
Secure Authentication with Multiple Parallel Keys.
CARDIS 1998: 150-156 |
30 | | Bruce Schneier,
Doug Whiting:
Twofish on Smart Cards.
CARDIS 1998: 265-276 |
29 | EE | Chris Hall,
David Wagner,
John Kelsey,
Bruce Schneier:
Building PRFs from PRPs.
CRYPTO 1998: 370-389 |
28 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
ESORICS 1998: 97-110 |
27 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators.
FSE 1998: 168-188 |
26 | EE | Don Coppersmith,
David Wagner,
Bruce Schneier,
John Kelsey:
Cryptanalysis of TWOPRIME.
FSE 1998: 32-48 |
25 | EE | Chris Hall,
John Kelsey,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Financial Cryptography 1998: 309-310 |
24 | EE | James Riordan,
Bruce Schneier:
Environmental Key Generation Towards Clueless Agents.
Mobile Agents and Security 1998: 15-24 |
23 | EE | Bruce Schneier,
John Kelsey,
Doug Whiting,
David Wagner,
Chris Hall:
On the Twofish Key Schedule.
Selected Areas in Cryptography 1998: 27-42 |
22 | EE | David Wagner,
Leone Simpson,
Ed Dawson,
John Kelsey,
William Millan,
Bruce Schneier:
Cryptanalysis of ORYX.
Selected Areas in Cryptography 1998: 296-305 |
21 | EE | Chris Hall,
John Kelsey,
Vincent Rijmen,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Selected Areas in Cryptography 1998: 319-338 |
20 | EE | Chris Slater,
O. Sami Saydjari,
Bruce Schneier,
Jim Wallner:
Toward a Secure System Engineering Methodolgy.
Workshop on New Security Paradigms 1998: 2-10 |
19 | | Bruce Schneier:
Cryptographic Design Vulnerabilities.
IEEE Computer 31(9): 29-33 (1998) |
18 | EE | Bruce Schneier:
Security pitfalls in cryptographic design.
Inf. Manag. Comput. Security 6(3): 133-137 (1998) |
1997 |
17 | EE | John Kelsey,
Bruce Schneier:
Conditional Purchase Orders.
ACM Conference on Computer and Communications Security 1997: 117-124 |
16 | EE | Bruce Schneier,
Chris Hall:
An Improved E-Mail Security Protocol.
ACSAC 1997: 227- |
15 | EE | Chris Hall,
Bruce Schneier:
Remote Electronic Gambling.
ACSAC 1997: 232-238 |
14 | EE | David Wagner,
Bruce Schneier,
John Kelsey:
Cryptoanalysis of the Cellular Encryption Algorithm.
CRYPTO 1997: 526-537 |
13 | EE | Bruce Schneier,
Doug Whiting:
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor.
FSE 1997: 242-259 |
12 | | John Kelsey,
Bruce Schneier,
David Wagner:
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
ICICS 1997: 233-246 |
11 | | John Kelsey,
Bruce Schneier,
Chris Hall,
David Wagner:
Secure Applications of Low-Entropy Keys.
ISW 1997: 121-134 |
10 | | John Kelsey,
Bruce Schneier,
David Wagner:
Protocol Interactions and the Chosen Protocol Attack.
Security Protocols Workshop 1997: 91-104 |
9 | | Bruce Schneier:
Cryptography, Security, and the Future.
Commun. ACM 40(1): 138 (1997) |
1996 |
8 | EE | John Kelsey,
Bruce Schneier,
Chris Hall:
An Authenticated Camera.
ACSAC 1996: 24-31 |
7 | | Bruce Schneier,
John Kelsey:
Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor.
CARDIS 1996 |
6 | EE | John Kelsey,
Bruce Schneier,
David Wagner:
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
CRYPTO 1996: 237-251 |
5 | EE | Bruce Schneier,
John Kelsey,
Jay Walker:
Distributed Proctoring.
ESORICS 1996: 172-182 |
4 | | Bruce Schneier,
John Kelsey:
Unbalanced Feistel Networks and Block Cipher Design.
FSE 1996: 121-144 |
3 | | Bruce Schneier,
John Kelsey:
Automatic Event-Stream Notarization Using Digital Signatures.
Security Protocols Workshop 1996: 155-169 |
1994 |
2 | | Matt Blaze,
Bruce Schneier:
The MacGuffin Block Cipher Algorithm.
FSE 1994: 97-110 |
1993 |
1 | | Bruce Schneier:
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish).
FSE 1993: 191-204 |