Secure audit logs to support computer forensics B Schneier, J Kelsey ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999 | 608 | 1999 |
Improved cryptanalysis of Rijndael N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting International Workshop on Fast Software Encryption, 213-230, 2000 | 602 | 2000 |
Two sh: A 128-bit block cipher B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson AES submission, 1998 | 529 | 1998 |
Recommendation for random number generation using deterministic random bit generators (revised) EB Barker, JM Kelsey US Department of Commerce, Technology Administration, National Institute of …, 2007 | 527 | 2007 |
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work J Kelsey, B Schneier Annual International Conference on the Theory and Applications of …, 2005 | 472 | 2005 |
Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des J Kelsey, B Schneier, D Wagner Annual international cryptology conference, 237-251, 1996 | 397 | 1996 |
Event auditing system B Schneier, JM Kelsey US Patent 5,978,475, 1999 | 373 | 1999 |
Cryptographic support for secure logs on untrusted machines. B Schneier, J Kelsey USENIX Security Symposium 98, 53-62, 1998 | 371 | 1998 |
Cryptanalytic attacks on pseudorandom number generators J Kelsey, B Schneier, D Wagner, C Hall International workshop on fast software encryption, 168-188, 1998 | 365 | 1998 |
Copy security for portable music players ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier US Patent 6,367,019, 2002 | 360 | 2002 |
Side channel cryptanalysis of product ciphers J Kelsey, B Schneier, D Wagner, C Hall European Symposium on Research in Computer Security, 97-110, 1998 | 352 | 1998 |
Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea J Kelsey, B Schneier, D Wagner International Conference on Information and Communications Security, 233-246, 1997 | 337 | 1997 |
Unbalanced Feistel networks and block cipher design B Schneier, J Kelsey International Workshop on Fast Software Encryption, 121-144, 1996 | 317 | 1996 |
Herding hash functions and the Nostradamus attack J Kelsey, T Kohno Annual International Conference on the Theory and Applications of …, 2006 | 291 | 2006 |
Digital signature with auditing bits B Schneier, J Kelsey US Patent 5,956,404, 1999 | 284 | 1999 |
The Twofish encryption algorithm: a 128-bit block cipher B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson John Wiley & Sons, Inc., 1999 | 276 | 1999 |
Side channel cryptanalysis of product ciphers J Kelsey, B Schneier, D Wagner, C Hall Journal of Computer Security 8 (2-3), 141-158, 2000 | 263 | 2000 |
Amplified boomerang attacks against reduced-round MARS and Serpent J Kelsey, T Kohno, B Schneier International Workshop on Fast Software Encryption, 75-93, 2000 | 250 | 2000 |
Protocol interactions and the chosen protocol attack J Kelsey, B Schneier, D Wagner International Workshop on Security Protocols, 91-104, 1997 | 207 | 1997 |
Yarrow-160: Notes on the design and analysis of the yarrow cryptographic pseudorandom number generator J Kelsey, B Schneier, N Ferguson International Workshop on Selected Areas in Cryptography, 13-33, 1999 | 197 | 1999 |