Twofish: A 128-bit block cipher B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson NIST AES Proposal 15 (1), 23-91, 1998 | 808 | 1998 |
Improved cryptanalysis of Rijndael N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting Fast Software Encryption: 7th International Workshop, FSE 2000 New York, NY …, 2001 | 695 | 2001 |
Secure audit logs to support computer forensics B Schneier, J Kelsey ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999 | 635 | 1999 |
Recommendation for random number generation using deterministic random bit generators (revised) EB Barker, JM Kelsey US Department of Commerce, Technology Administration, National Institute of …, 2007 | 633 | 2007 |
Status report on the third round of the NIST post-quantum cryptography standardization process G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, ... US Department of Commerce, National Institute of Standards and Technology 4, 07, 2022 | 610 | 2022 |
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work J Kelsey, B Schneier Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 504 | 2005 |
Cryptanalytic attacks on pseudorandom number generators J Kelsey, B Schneier, D Wagner, C Hall International workshop on fast software encryption, 168-188, 1998 | 443 | 1998 |
Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des J Kelsey, B Schneier, D Wagner Annual international cryptology conference, 237-251, 1996 | 433 | 1996 |
Cryptographic support for secure logs on untrusted machines. B Schneier, J Kelsey USENIX Security Symposium 98, 53-62, 1998 | 418 | 1998 |
Event auditing system B Schneier, JM Kelsey US Patent 5,978,475, 1999 | 401 | 1999 |
Status report on the second round of the NIST post-quantum cryptography standardization process G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ... US Department of Commerce, NIST 2, 69, 2020 | 390 | 2020 |
Side channel cryptanalysis of product ciphers J Kelsey, B Schneier, D Wagner, C Hall Computer Security—ESORICS 98: 5th European Symposium on Research in …, 1998 | 383 | 1998 |
Copy security for portable music players ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier US Patent 6,367,019, 2002 | 378 | 2002 |
Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea J Kelsey, B Schneier, D Wagner International Conference on Information and Communications Security, 233-246, 1997 | 358 | 1997 |
Unbalanced Feistel networks and block cipher design B Schneier, J Kelsey International Workshop on Fast Software Encryption, 121-144, 1996 | 337 | 1996 |
Herding hash functions and the Nostradamus attack J Kelsey, T Kohno Annual International Conference on the Theory and Applications of …, 2006 | 324 | 2006 |
Amplified boomerang attacks against reduced-round MARS and Serpent J Kelsey, T Kohno, B Schneier International Workshop on Fast Software Encryption, 75-93, 2000 | 300 | 2000 |
Digital signature with auditing bits B Schneier, J Kelsey US Patent 5,956,404, 1999 | 296 | 1999 |
Recommendation for the entropy sources used for random bit generation MS Turan, E Barker, J Kelsey, KA McKay, ML Baish, M Boyle NIST Special Publication 800 (90B), 102, 2018 | 283 | 2018 |
Side channel cryptanalysis of product ciphers J Kelsey, B Schneier, D Wagner, C Hall Journal of Computer Security 8 (2-3), 141-158, 2000 | 267 | 2000 |