Следене
John Kelsey
John Kelsey
Потвърден имейл адрес: nist.gov
Заглавие
Позовавания
Позовавания
Година
Twofish: A 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
NIST AES Proposal 15 (1), 23-91, 1998
7841998
Improved cryptanalysis of Rijndael
N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting
Fast Software Encryption: 7th International Workshop, FSE 2000 New York, NY …, 2001
6782001
Secure audit logs to support computer forensics
B Schneier, J Kelsey
ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999
6341999
Recommendation for random number generation using deterministic random bit generators (revised)
EB Barker, JM Kelsey
US Department of Commerce, Technology Administration, National Institute of …, 2007
6092007
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
J Kelsey, B Schneier
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
4962005
Status report on the first round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ...
US Department of Commerce, National Institute of Standards and Technology, 2019
4792019
Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des
J Kelsey, B Schneier, D Wagner
Annual international cryptology conference, 237-251, 1996
4311996
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
International workshop on fast software encryption, 168-188, 1998
4231998
Cryptographic support for secure logs on untrusted machines.
B Schneier, J Kelsey
USENIX Security Symposium 98, 53-62, 1998
4071998
Event auditing system
B Schneier, JM Kelsey
US Patent 5,978,475, 1999
3941999
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Computer Security—ESORICS 98: 5th European Symposium on Research in …, 1998
3801998
Copy security for portable music players
ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier
US Patent 6,367,019, 2002
3742002
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST 2, 69, 2020
3602020
Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea
J Kelsey, B Schneier, D Wagner
International Conference on Information and Communications Security, 233-246, 1997
3501997
Unbalanced Feistel networks and block cipher design
B Schneier, J Kelsey
International Workshop on Fast Software Encryption, 121-144, 1996
3301996
Herding hash functions and the Nostradamus attack
J Kelsey, T Kohno
Annual International Conference on the Theory and Applications of …, 2006
3162006
Digital signature with auditing bits
B Schneier, J Kelsey
US Patent 5,956,404, 1999
2941999
Amplified boomerang attacks against reduced-round MARS and Serpent
J Kelsey, T Kohno, B Schneier
International Workshop on Fast Software Encryption, 75-93, 2000
2902000
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2702000
Recommendation for the entropy sources used for random bit generation
MS Turan, E Barker, J Kelsey, KA McKay, ML Baish, M Boyle
NIST Special Publication 800 (90B), 102, 2018
2442018
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20