Follow
Chris Hall
Chris Hall
Verified email at uwo.ca - Homepage
Title
Cited by
Cited by
Year
Twofish: A 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
NIST AES Proposal 15 (1), 23-91, 1998
7891998
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
International workshop on fast software encryption, 168-188, 1998
4161998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Computer Security—ESORICS 98: 5th European Symposium on Research in …, 1998
3751998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2742000
Secure applications of low-entropy keys
J Kelsey, B Schneier, C Hall, D Wagner
International Workshop on Information Security, 121-134, 1997
1601997
Protecting secret keys with personal entropy
C Ellison, C Hall, R Milbert, B Schneier
Future Generation Computer Systems 16 (4), 311-318, 2000
1582000
Social epidemiology and complex system dynamic modelling as applied to health behaviour and drug use research
S Galea, C Hall, GA Kaplan
International Journal of Drug Policy 20 (3), 209-216, 2009
1512009
Performance comparison of the AES submissions
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
Second AES Candidate Conference, 15-34, 1999
1361999
Reaction attacks against several public-key cryptosystem
C Hall, I Goldberg, B Schneier
Information and Communication Security: Second International Conference …, 1999
1331999
Building prfs from prps
C Hall, D Wagner, J Kelsey, B Schneier
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
1171998
Big symplectic or orthogonal monodromy modulo
C Hall
752008
An open-image theorem for a general class of abelian varieties
C Hall
Bulletin of the London Mathematical Society 43 (4), 703-711, 2011
642011
Uniform results for Serre's theorem for elliptic curves
AC Cojocaru, C Hall
International Mathematics Research Notices 2005 (50), 3065-3080, 2005
622005
The Twofish team’s final comments on AES Selection
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson, T Kohno, ...
AES round 2 (1), 1-13, 2000
622000
Expander graphs, gonality, and variation of Galois representations
JS Ellenberg, C Hall, E Kowalski
582012
Ramanujan coverings of graphs
C Hall, D Puder, WF Sawin
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
462016
L-functions of twisted Legendre curves
C Hall
Journal of Number Theory 119 (1), 128-147, 2006
452006
Remote electronic gambling
C Hall, B Schneier
Proceedings 13th annual computer security applications conference, 232-238, 1997
451997
On the twofish key schedule
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
International Workshop on Selected Areas in Cryptography, 27-42, 1998
321998
Non‐simple abelian varieties in a family: geometric and analytic approaches
JS Ellenberg, C Elsholtz, C Hall, E Kowalski
Journal of the London Mathematical Society 80 (1), 135-154, 2009
302009
The system can't perform the operation now. Try again later.
Articles 1–20