dblp.uni-trier.dewww.uni-trier.de

Bruce Schneier

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
90EEBruce Schneier: The Psychology of Security. AFRICACRYPT 2008: 50-79
89EEAlexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier: Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008
2007
88EEBruce Schneier: The psychology of security. Commun. ACM 50(5): 128 (2007)
2005
87EEJohn Kelsey, Bruce Schneier: Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. EUROCRYPT 2005: 474-490
86EEBruce Schneier: Solitaire. Encyclopedia of Cryptography and Security 2005
85EEBruce Schneier: Attack trends: 2004 and 2005. ACM Queue 3(5): 52-53 (2005)
84EEBruce Schneier: Two-factor authentication: too little, too late. Commun. ACM 48(4): 136 (2005)
83EEBruce Schneier: Risks of third-party data. Commun. ACM 48(5): 136 (2005)
82EERoss J. Anderson, Bruce Schneier: Guest Editors' Introduction: Economics of Information Security. IEEE Security & Privacy 3(1): 12-13 (2005)
81EEBruce Schneier: Authentication and Expiration. IEEE Security & Privacy 3(1): 88 (2005)
80EEBruce Schneier: The Zotob Storm. IEEE Security & Privacy 3(6): 96 (2005)
2004
79EEBruce Schneier: Sensible Authentication. ACM Queue 1(10): 74-78 (2004)
78EEBruce Schneier: The nonsecurity of secrecy. Commun. ACM 47(10): 120 (2004)
77EEPaul C. Kocher, Bruce Schneier: Insider risks in elections. Commun. ACM 47(7): 104 (2004)
76EEBruce Schneier: Hacking the Business Climate for Network Security. IEEE Computer 37(4): 87-89 (2004)
75EEBruce Schneier: Voting Security and Technology. IEEE Security & Privacy 2(1): 84 (2004)
74EEBruce Schneier: Security and Compliance. IEEE Security & Privacy 2(3): 96 (2004)
73EEBruce Schneier: Customers, Passwords, and Web Sites. IEEE Security & Privacy 2(4): 88 (2004)
72EEBruce Schneier: SIMS: Solution, or Part of the Problem? IEEE Security & Privacy 2(5): 88 (2004)
2003
71EENiels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346
70EEDavid L. Dill, Bruce Schneier, Barbara Simons: Voting and technology: who gets to count your vote? Commun. ACM 46(8): 29-31 (2003)
69EEBruce Schneier: We Are All Security Consumers. IEEE Security & Privacy 1(1): 104 (2003)
68EEBruce Schneier: Locks and Full Disclosure. IEEE Security & Privacy 1(2): 88 (2003)
67EEBruce Schneier: Guilty Until Proven Innocent? IEEE Security & Privacy 1(3): 88, 87 (2003)
66EEBruce Schneier: The Speed of Security. IEEE Security & Privacy 1(4): 96 (2003)
65EEBruce Schneier: Airplane Hackers. IEEE Security & Privacy 1(6): 92 (2003)
2002
64EEKahil Jallad, Jonathan Katz, Bruce Schneier: Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. ISC 2002: 90-101
2001
63 Bruce Schneier: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings Springer 2001
62 Stephan Somogyi, Bruce Schneier: The perils of port 80. Commun. ACM 44(10): 168 (2001)
61EEBruce Schneier: Insurance and the computer industry. Commun. ACM 44(3): 114-115 (2001)
60EEBruce Schneier: Cyber underwriters lab. Commun. ACM 44(4): 128 (2001)
59 Bruce Schneier: Managed Security Monitoring: Network Security for the 21st Centur. Computers & Security 20(6): 491-503 (2001)
2000
58 Jean-Jacques Quisquater, Bruce Schneier: Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings Springer 2000
57 Niels Ferguson, Bruce Schneier, David Wagner: Security Weaknesses in a Randomized Stream Cipher. ACISP 2000: 234-241
56 Bruce Schneier, Doug Whiting: A Performance Comparison of the Five AES Finalists. AES Candidate Conference 2000: 123-135
55 John Kelsey, Bruce Schneier: MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. AES Candidate Conference 2000: 169-185
54 Tadayoshi Kohno, John Kelsey, Bruce Schneier: Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211
53 Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Niels Ferguson: Comments on Twofish as an AES Candidate. AES Candidate Conference 2000: 355-356
52EENiels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting: Improved Cryptanalysis of Rijndael. FSE 2000: 213-230
51EEJohn Kelsey, Tadayoshi Kohno, Bruce Schneier: Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93
50EECarl M. Ellison, Bruce Schneier: Risks of PKI: Secure Email. Commun. ACM 43(1): 160 (2000)
49EEBruce Schneier: Semantic network attacks. Commun. ACM 43(12): 168 (2000)
48EECarl M. Ellison, Bruce Schneier: Risks of PKI: E-Commerce. Commun. ACM 43(2): 152 (2000)
47EECarl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier: Protecting secret keys with personal entropy. Future Generation Comp. Syst. 16(4): 311-318 (2000)
46 John Kelsey, Bruce Schneier, David Wagner, Chris Hall: Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security 8(2/3): (2000)
1999
45EEBruce Schneier, Mudge, David Wagner: Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). CQRE 1999: 192-203
44EEJohn Kelsey, Bruce Schneier, David Wagner: Mod n Cryptanalysis, with Applications Against RC5P and M6. FSE 1999: 139-155
43 Chris Hall, Ian Goldberg, Bruce Schneier: Reaction Attacks against several Public-Key Cryptosystems. ICICS 1999: 2-12
42EEJohn Kelsey, Bruce Schneier: Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. Recent Advances in Intrusion Detection 1999
41EEJohn Kelsey, Bruce Schneier: Key-Schedule Cryptanalysis of DEAL. Selected Areas in Cryptography 1999: 118-134
40EEJohn Kelsey, Bruce Schneier, Niels Ferguson: Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. Selected Areas in Cryptography 1999: 13-33
39EEBruce Schneier, John Kelsey: Secure Audit Logs to Support Computer Forensics. ACM Trans. Inf. Syst. Secur. 2(2): 159-176 (1999)
38EEBruce Schneier: Risks of Relying on Cryptography. Commun. ACM 42(10): 144 (1999)
37EEBruce Schneier: The Uses and Abuses of Biometrics. Commun. ACM 42(8): 136 (1999)
36EEBruce Schneier: The Trojan Horse Race. Commun. ACM 42(9): 128 (1999)
35EEJohn Kelsey, Bruce Schneier: The Street Performer Protocol and Digital Copyrights. First Monday 4(6): (1999)
34EEBruce Schneier: Cryptography: The Importance of Not Being Different. IEEE Computer 32(3): 108-109 (1999)
1998
33EEBruce Schneier, Mudge: Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). ACM Conference on Computer and Communications Security 1998: 132-141
32EEBruce Schneier, James Riordan: A Certified E-Mail Protocol. ACSAC 1998: 347-352
31 John Kelsey, Bruce Schneier: Secure Authentication with Multiple Parallel Keys. CARDIS 1998: 150-156
30 Bruce Schneier, Doug Whiting: Twofish on Smart Cards. CARDIS 1998: 265-276
29EEChris Hall, David Wagner, John Kelsey, Bruce Schneier: Building PRFs from PRPs. CRYPTO 1998: 370-389
28EEJohn Kelsey, Bruce Schneier, David Wagner, Chris Hall: Side Channel Cryptanalysis of Product Ciphers. ESORICS 1998: 97-110
27EEJohn Kelsey, Bruce Schneier, David Wagner, Chris Hall: Cryptanalytic Attacks on Pseudorandom Number Generators. FSE 1998: 168-188
26EEDon Coppersmith, David Wagner, Bruce Schneier, John Kelsey: Cryptanalysis of TWOPRIME. FSE 1998: 32-48
25EEChris Hall, John Kelsey, Bruce Schneier, David Wagner: Cryptanalysis of SPEED. Financial Cryptography 1998: 309-310
24EEJames Riordan, Bruce Schneier: Environmental Key Generation Towards Clueless Agents. Mobile Agents and Security 1998: 15-24
23EEBruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall: On the Twofish Key Schedule. Selected Areas in Cryptography 1998: 27-42
22EEDavid Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier: Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305
21EEChris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner: Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338
20EEChris Slater, O. Sami Saydjari, Bruce Schneier, Jim Wallner: Toward a Secure System Engineering Methodolgy. Workshop on New Security Paradigms 1998: 2-10
19 Bruce Schneier: Cryptographic Design Vulnerabilities. IEEE Computer 31(9): 29-33 (1998)
18EEBruce Schneier: Security pitfalls in cryptographic design. Inf. Manag. Comput. Security 6(3): 133-137 (1998)
1997
17EEJohn Kelsey, Bruce Schneier: Conditional Purchase Orders. ACM Conference on Computer and Communications Security 1997: 117-124
16EEBruce Schneier, Chris Hall: An Improved E-Mail Security Protocol. ACSAC 1997: 227-
15EEChris Hall, Bruce Schneier: Remote Electronic Gambling. ACSAC 1997: 232-238
14EEDavid Wagner, Bruce Schneier, John Kelsey: Cryptoanalysis of the Cellular Encryption Algorithm. CRYPTO 1997: 526-537
13EEBruce Schneier, Doug Whiting: Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. FSE 1997: 242-259
12 John Kelsey, Bruce Schneier, David Wagner: Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. ICICS 1997: 233-246
11 John Kelsey, Bruce Schneier, Chris Hall, David Wagner: Secure Applications of Low-Entropy Keys. ISW 1997: 121-134
10 John Kelsey, Bruce Schneier, David Wagner: Protocol Interactions and the Chosen Protocol Attack. Security Protocols Workshop 1997: 91-104
9 Bruce Schneier: Cryptography, Security, and the Future. Commun. ACM 40(1): 138 (1997)
1996
8EEJohn Kelsey, Bruce Schneier, Chris Hall: An Authenticated Camera. ACSAC 1996: 24-31
7 Bruce Schneier, John Kelsey: Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. CARDIS 1996
6EEJohn Kelsey, Bruce Schneier, David Wagner: Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. CRYPTO 1996: 237-251
5EEBruce Schneier, John Kelsey, Jay Walker: Distributed Proctoring. ESORICS 1996: 172-182
4 Bruce Schneier, John Kelsey: Unbalanced Feistel Networks and Block Cipher Design. FSE 1996: 121-144
3 Bruce Schneier, John Kelsey: Automatic Event-Stream Notarization Using Digital Signatures. Security Protocols Workshop 1996: 155-169
1994
2 Matt Blaze, Bruce Schneier: The MacGuffin Block Cipher Algorithm. FSE 1994: 97-110
1993
1 Bruce Schneier: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). FSE 1993: 191-204

Coauthor Index

1Ross J. Anderson [82]
2Matt Blaze [2]
3Don Coppersmith [26]
4Alexei Czeskis [89]
5Ed Dawson [22]
6David L. Dill [70]
7Carl M. Ellison [47] [48] [50]
8Niels Ferguson [40] [52] [53] [57] [71]
9Ian Goldberg [43]
10Steven D. Gribble [89]
11Chris Hall [8] [11] [15] [16] [21] [23] [25] [27] [28] [29] [43] [46] [47]
12David J. St. Hilaire [89]
13Kahil Jallad [64]
14Jonathan Katz [64]
15John Kelsey [3] [4] [5] [6] [7] [8] [10] [11] [12] [14] [17] [21] [22] [23] [25] [26] [27] [28] [29] [31] [35] [39] [40] [41] [42] [44] [46] [51] [52] [53] [54] [55] [71] [87]
16Paul C. Kocher [77]
17Tadayoshi Kohno [51] [54] [71] [89]
18Karl Koscher [89]
19Stefan Lucks [52] [71]
20Randy Milbert [47]
21William Millan [22]
22 Mudge [33] [45]
23Jean-Jacques Quisquater [58]
24Vincent Rijmen [21]
25James Riordan [24] [32]
26O. Sami Saydjari [20]
27Barbara B. Simons (Barbara Simons) [70]
28Leone Simpson [22]
29Chris Slater [20]
30Stephan Somogyi [62]
31Michael Stay [52]
32David Wagner [6] [10] [11] [12] [14] [21] [22] [23] [25] [26] [27] [28] [29] [44] [45] [46] [52] [53] [57]
33Jay Walker [5]
34Jim Wallner [20]
35Doug Whiting [13] [23] [30] [52] [53] [56] [71]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)