John Kelsey
John Kelsey
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα nist.gov
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Secure audit logs to support computer forensics
B Schneier, J Kelsey
ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999
5951999
Improved cryptanalysis of Rijndael
N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting
International Workshop on Fast Software Encryption, 213-230, 2000
5882000
Two sh: a 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
AES submission, 1998
5101998
Recommendation for random number generation using deterministic random bit generators (revised)
EB Barker, JM Kelsey
US Department of Commerce, Technology Administration, National Institute of …, 2007
4962007
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
J Kelsey, B Schneier
Annual International Conference on the Theory and Applications of …, 2005
4612005
Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des
J Kelsey, B Schneier, D Wagner
Annual international cryptology conference, 237-251, 1996
3861996
Cryptographic support for secure logs on untrusted machines.
B Schneier, J Kelsey
USENIX Security Symposium 98, 53-62, 1998
3641998
Event auditing system
B Schneier, JM Kelsey
US Patent 5,978,475, 1999
3611999
Copy security for portable music players
ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier
US Patent 6,367,019, 2002
3522002
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
International workshop on fast software encryption, 168-188, 1998
3401998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
European Symposium on Research in Computer Security, 97-110, 1998
3391998
Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea
J Kelsey, B Schneier, D Wagner
International Conference on Information and Communications Security, 233-246, 1997
3271997
Unbalanced Feistel networks and block cipher design
B Schneier, J Kelsey
International Workshop on Fast Software Encryption, 121-144, 1996
3101996
Herding hash functions and the Nostradamus attack
J Kelsey, T Kohno
Annual International Conference on the Theory and Applications of …, 2006
2842006
Digital signature with auditing bits
B Schneier, J Kelsey
US Patent 5,956,404, 1999
2771999
The Twofish encryption algorithm: a 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
John Wiley & Sons, Inc., 1999
2701999
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2582000
Amplified boomerang attacks against reduced-round MARS and Serpent
J Kelsey, T Kohno, B Schneier
International Workshop on Fast Software Encryption, 75-93, 2000
2402000
Protocol interactions and the chosen protocol attack
J Kelsey, B Schneier, D Wagner
International Workshop on Security Protocols, 91-104, 1997
2011997
Helix: Fast encryption and authentication in a single cryptographic primitive
N Ferguson, D Whiting, B Schneier, J Kelsey, S Lucks, T Kohno
International workshop on fast software encryption, 330-346, 2003
1902003
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20