Παρακολούθηση
John Kelsey
John Kelsey
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα nist.gov
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Twofish: A 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
NIST AES Proposal 15 (1), 23-91, 1998
7511998
Improved cryptanalysis of Rijndael
N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting
Fast Software Encryption: 7th International Workshop, FSE 2000 New York, NY …, 2001
6352001
Secure audit logs to support computer forensics
B Schneier, J Kelsey
ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999
6121999
Recommendation for random number generation using deterministic random bit generators (revised)
EB Barker, JM Kelsey
US Department of Commerce, Technology Administration, National Institute of …, 2007
5492007
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
J Kelsey, B Schneier
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
4802005
Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des
J Kelsey, B Schneier, D Wagner
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 2001
4102001
Cryptographic support for secure logs on untrusted machines.
B Schneier, J Kelsey
USENIX Security Symposium 98, 53-62, 1998
3921998
Event auditing system
B Schneier, JM Kelsey
US Patent 5,978,475, 1999
3861999
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
Fast Software Encryption: 5th International Workshop, FSE’98 Paris, France …, 1998
3861998
Copy security for portable music players
ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier
US Patent 6,367,019, 2002
3662002
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Computer Security—ESORICS 98: 5th European Symposium on Research in …, 1998
3621998
Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea
J Kelsey, B Schneier, D Wagner
Information and Communications Security: First International Conference …, 2005
3422005
Unbalanced Feistel networks and block cipher design
B Schneier, J Kelsey
Fast Software Encryption: Third International Workshop Cambridge, UK …, 2005
3262005
Herding hash functions and the Nostradamus attack
J Kelsey, T Kohno
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
3012006
Digital signature with auditing bits
B Schneier, J Kelsey
US Patent 5,956,404, 1999
2871999
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST 2, 2020
2782020
Status report on the first round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ...
US Department of Commerce, National Institute of Standards and Technology, 2019
2612019
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2612000
Amplified boomerang attacks against reduced-round MARS and Serpent
J Kelsey, T Kohno, B Schneier
Fast Software Encryption: 7th International Workshop, FSE 2000 New York, NY …, 2002
2582002
Protocol interactions and the chosen protocol attack
J Kelsey, B Schneier, D Wagner
Security Protocols: 5th International Workshop Paris, France, April 7–9 …, 2005
2082005
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20