Chris Hall
Chris Hall
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα uwo.ca - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Two sh: a 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
AES submission, 1998
5101998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
European Symposium on Research in Computer Security, 97-110, 1998
3391998
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
International workshop on fast software encryption, 168-188, 1998
3391998
The Twofish encryption algorithm: a 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
John Wiley & Sons, Inc., 1999
2701999
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2582000
Protecting secret keys with personal entropy
C Ellison, C Hall, R Milbert, B Schneier
Future Generation Computer Systems 16 (4), 311-318, 2000
1582000
Secure applications of low-entropy keys
J Kelsey, B Schneier, C Hall, D Wagner
International Workshop on Information Security, 121-134, 1997
1431997
Social epidemiology and complex system dynamic modelling as applied to health behaviour and drug use research
S Galea, C Hall, GA Kaplan
International Journal of Drug Policy 20 (3), 209-216, 2009
1332009
Performance comparison of the AES submissions
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
Second AES Candidate Conference, 15-34, 1999
1221999
Reaction attacks against several public-key cryptosystem
C Hall, I Goldberg, B Schneier
International Conference on Information and Communications Security, 2-12, 1999
1181999
Building prfs from prps
C Hall, D Wagner, J Kelsey, B Schneier
Annual International Cryptology Conference, 370-389, 1998
881998
Big symplectic or orthogonal monodromy modulo ℓ
C Hall
Duke Mathematical Journal 141 (1), 179-203, 2008
632008
Expander graphs, gonality, and variation of Galois representations
JS Ellenberg, C Hall, E Kowalski
Duke Mathematical Journal 161 (7), 1233-1275, 2012
562012
An open-image theorem for a general class of abelian varieties
C Hall
Bulletin of the London Mathematical Society 43 (4), 703-711, 2011
562011
Uniform results for Serre's theorem for elliptic curves
AC Cojocaru, C Hall
International Mathematics Research Notices 2005 (50), 3065-3080, 2005
562005
The Twofish team’s final comments on AES Selection
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson, T Kohno, ...
AES round 2 (1), 1-13, 2000
552000
L-functions of twisted Legendre curves
C Hall
Journal of Number Theory 119 (1), 128-147, 2006
372006
Remote electronic gambling
C Hall, B Schneier
Proceedings 13th Annual Computer Security Applications Conference, 232-238, 1997
371997
Ramanujan coverings of graphs
C Hall, D Puder, WF Sawin
Advances in Mathematics 323, 367-410, 2018
342018
On the twofish key schedule
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
International Workshop on Selected Areas in Cryptography, 27-42, 1998
281998
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20