John Kelsey
John Kelsey
Bestätigte E-Mail-Adresse bei nist.gov
Titel
Zitiert von
Zitiert von
Jahr
Improved cryptanalysis of Rijndael
N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting
International Workshop on Fast Software Encryption, 213-230, 2000
5612000
Secure audit logs to support computer forensics
B Schneier, J Kelsey
ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999
5571999
Two sh: A 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
AES submission, 1998
4801998
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
J Kelsey, B Schneier
Annual International Conference on the Theory and Applications of …, 2005
4452005
Recommendation for random number generation using deterministic random bit generators
E Barker, L Feldman, G Witte
National Institute of Standards and Technology, 2015
4272015
Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des
J Kelsey, B Schneier, D Wagner
Annual International Cryptology Conference, 237-251, 1996
3881996
Copy security for portable music players
ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier
US Patent 6,367,019, 2002
3422002
Event auditing system
B Schneier, JM Kelsey
US Patent 5,978,475, 1999
3421999
Cryptographic support for secure logs on untrusted machines.
B Schneier, J Kelsey
USENIX Security Symposium 98, 53-62, 1998
3381998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
European Symposium on Research in Computer Security, 97-110, 1998
3241998
Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea
J Kelsey, B Schneier, D Wagner
International Conference on Information and Communications Security, 233-246, 1997
3201997
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
International workshop on fast software encryption, 168-188, 1998
3061998
Unbalanced Feistel networks and block cipher design
B Schneier, J Kelsey
International Workshop on Fast Software Encryption, 121-144, 1996
2941996
Digital signature with auditing bits
B Schneier, J Kelsey
US Patent 5,956,404, 1999
2741999
Herding hash functions and the Nostradamus attack
J Kelsey, T Kohno
Annual International Conference on the Theory and Applications of …, 2006
2732006
The Twofish encryption algorithm: a 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
John Wiley & Sons, Inc., 1999
2571999
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2362000
Amplified boomerang attacks against reduced-round MARS and Serpent
J Kelsey, T Kohno, B Schneier
International Workshop on Fast Software Encryption, 75-93, 2000
2292000
Protocol interactions and the chosen protocol attack
J Kelsey, B Schneier, D Wagner
International Workshop on Security Protocols, 91-104, 1997
1921997
Helix: Fast encryption and authentication in a single cryptographic primitive
N Ferguson, D Whiting, B Schneier, J Kelsey, S Lucks, T Kohno
International workshop on fast software encryption, 330-346, 2003
1882003
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20