[go: up one dir, main page]

Follow
John Kelsey
John Kelsey
Verified email at nist.gov
Title
Cited by
Cited by
Year
Status report on the third round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, ...
US Department of Commerce, National Institute of Standards and Technology 4 …, 2022
10962022
Twofish: A 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
NIST AES Proposal 15 (1), 23-91, 1998
8401998
Recommendation for random number generation using deterministic random bit generators (revised)
EB Barker, JM Kelsey
US Department of Commerce, Technology Administration, National Institute of …, 2007
7522007
Improved cryptanalysis of Rijndael
N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting
International Workshop on Fast Software Encryption, 213-230, 2000
7212000
Secure audit logs to support computer forensics
B Schneier, J Kelsey
ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999
6561999
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST 2, 69, 2020
5482020
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work
J Kelsey, B Schneier
Annual International Conference on the Theory and Applications of …, 2005
5272005
Recommendation for the entropy sources used for random bit generation
M Sönmez Turan, E Barker, J Kelsey, K McKay, M Baish, M Boyle
National Institute of Standards and Technology, 2016
5202016
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
International workshop on fast software encryption, 168-188, 1998
4791998
Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des
J Kelsey, B Schneier, D Wagner
Annual international cryptology conference, 237-251, 1996
4481996
Cryptographic support for secure logs on untrusted machines.
B Schneier, J Kelsey
USENIX Security Symposium 98, 53-62, 1998
4191998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
European Symposium on Research in Computer Security, 97-110, 1998
3931998
Event auditing system
B Schneier, JM Kelsey
US Patent 5,978,475, 1999
3861999
Copy security for portable music players
ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier
US Patent 6,367,019, 2002
3782002
Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea
J Kelsey, B Schneier, D Wagner
International Conference on Information and Communications Security, 233-246, 1997
3621997
Unbalanced Feistel networks and block cipher design
B Schneier, J Kelsey
International Workshop on Fast Software Encryption, 121-144, 1996
3491996
Amplified boomerang attacks against reduced-round MARS and Serpent
J Kelsey, T Kohno, B Schneier
International Workshop on Fast Software Encryption, 75-93, 2000
3302000
Herding hash functions and the Nostradamus attack
J Kelsey, T Kohno
Annual International Conference on the Theory and Applications of …, 2006
3232006
Digital signature with auditing bits
B Schneier, J Kelsey
US Patent 5,956,404, 1999
2941999
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2742000
The system can't perform the operation now. Try again later.
Articles 1–20