| Status report on the third round of the NIST post-quantum cryptography standardization process G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, ... US Department of Commerce, National Institute of Standards and Technology 4 …, 2022 | 1096 | 2022 |
| Twofish: A 128-bit block cipher B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson NIST AES Proposal 15 (1), 23-91, 1998 | 840 | 1998 |
| Recommendation for random number generation using deterministic random bit generators (revised) EB Barker, JM Kelsey US Department of Commerce, Technology Administration, National Institute of …, 2007 | 752 | 2007 |
| Improved cryptanalysis of Rijndael N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting International Workshop on Fast Software Encryption, 213-230, 2000 | 721 | 2000 |
| Secure audit logs to support computer forensics B Schneier, J Kelsey ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999 | 656 | 1999 |
| Status report on the second round of the NIST post-quantum cryptography standardization process G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ... US Department of Commerce, NIST 2, 69, 2020 | 548 | 2020 |
| Second Preimages on n-Bit Hash Functions for Much Less than 2n Work J Kelsey, B Schneier Annual International Conference on the Theory and Applications of …, 2005 | 527 | 2005 |
| Recommendation for the entropy sources used for random bit generation M Sönmez Turan, E Barker, J Kelsey, K McKay, M Baish, M Boyle National Institute of Standards and Technology, 2016 | 520 | 2016 |
| Cryptanalytic attacks on pseudorandom number generators J Kelsey, B Schneier, D Wagner, C Hall International workshop on fast software encryption, 168-188, 1998 | 479 | 1998 |
| Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des J Kelsey, B Schneier, D Wagner Annual international cryptology conference, 237-251, 1996 | 448 | 1996 |
| Cryptographic support for secure logs on untrusted machines. B Schneier, J Kelsey USENIX Security Symposium 98, 53-62, 1998 | 419 | 1998 |
| Side channel cryptanalysis of product ciphers J Kelsey, B Schneier, D Wagner, C Hall European Symposium on Research in Computer Security, 97-110, 1998 | 393 | 1998 |
| Event auditing system B Schneier, JM Kelsey US Patent 5,978,475, 1999 | 386 | 1999 |
| Copy security for portable music players ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier US Patent 6,367,019, 2002 | 378 | 2002 |
| Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea J Kelsey, B Schneier, D Wagner International Conference on Information and Communications Security, 233-246, 1997 | 362 | 1997 |
| Unbalanced Feistel networks and block cipher design B Schneier, J Kelsey International Workshop on Fast Software Encryption, 121-144, 1996 | 349 | 1996 |
| Amplified boomerang attacks against reduced-round MARS and Serpent J Kelsey, T Kohno, B Schneier International Workshop on Fast Software Encryption, 75-93, 2000 | 330 | 2000 |
| Herding hash functions and the Nostradamus attack J Kelsey, T Kohno Annual International Conference on the Theory and Applications of …, 2006 | 323 | 2006 |
| Digital signature with auditing bits B Schneier, J Kelsey US Patent 5,956,404, 1999 | 294 | 1999 |
| Side channel cryptanalysis of product ciphers J Kelsey, B Schneier, D Wagner, C Hall Journal of Computer Security 8 (2-3), 141-158, 2000 | 274 | 2000 |