John Kelsey
John Kelsey
Verified email at nist.gov
Title
Cited by
Cited by
Year
Improved cryptanalysis of Rijndael
N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting
International Workshop on Fast Software Encryption, 213-230, 2000
5582000
Secure audit logs to support computer forensics
B Schneier, J Kelsey
ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999
5531999
Two sh: A 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
AES submission, 1998
4781998
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
J Kelsey, B Schneier
Annual International Conference on the Theory and Applications of …, 2005
4432005
Recommendation for random number generation using deterministic random bit generators
E Barker, L Feldman, G Witte
National Institute of Standards and Technology, 2015
4202015
Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des
J Kelsey, B Schneier, D Wagner
Annual International Cryptology Conference, 237-251, 1996
3851996
Copy security for portable music players
ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier
US Patent 6,367,019, 2002
3412002
Event auditing system
B Schneier, JM Kelsey
US Patent 5,978,475, 1999
3381999
Cryptographic support for secure logs on untrusted machines.
B Schneier, J Kelsey
USENIX Security Symposium 98, 53-62, 1998
3351998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
European Symposium on Research in Computer Security, 97-110, 1998
3211998
Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea
J Kelsey, B Schneier, D Wagner
International Conference on Information and Communications Security, 233-246, 1997
3191997
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
International workshop on fast software encryption, 168-188, 1998
3031998
Unbalanced Feistel networks and block cipher design
B Schneier, J Kelsey
International Workshop on Fast Software Encryption, 121-144, 1996
2931996
Digital signature with auditing bits
B Schneier, J Kelsey
US Patent 5,956,404, 1999
2731999
Herding hash functions and the Nostradamus attack
J Kelsey, T Kohno
Annual International Conference on the Theory and Applications of …, 2006
2702006
The Twofish encryption algorithm: a 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
John Wiley & Sons, Inc., 1999
2551999
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2372000
Amplified boomerang attacks against reduced-round MARS and Serpent
J Kelsey, T Kohno, B Schneier
International Workshop on Fast Software Encryption, 75-93, 2000
2272000
Protocol interactions and the chosen protocol attack
J Kelsey, B Schneier, D Wagner
International Workshop on Security Protocols, 91-104, 1997
1901997
Helix: Fast encryption and authentication in a single cryptographic primitive
N Ferguson, D Whiting, B Schneier, J Kelsey, S Lucks, T Kohno
International workshop on fast software encryption, 330-346, 2003
1872003
The system can't perform the operation now. Try again later.
Articles 1–20