default search action
John Kelsey
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]John Kelsey, Stefan Lucks, Stephan Müller:
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF. IACR Trans. Symmetric Cryptol. 2024(1): 5-34 (2024) - 2022
- [c49]Ray A. Perlner, John Kelsey, David A. Cooper:
Breaking Category Five SPHINCS+ with SHA-256. PQCrypto 2022: 501-522 - [i9]John Kelsey, Stefan Lucks:
Coalition and Threshold Hash-Based Signatures. IACR Cryptol. ePrint Arch. 2022: 241 (2022) - [i8]Ray A. Perlner, John Kelsey, David A. Cooper:
Breaking Category Five SPHINCS+ with SHA-256. IACR Cryptol. ePrint Arch. 2022: 1061 (2022) - 2020
- [c48]John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sönmez Turan:
TMPS: Ticket-Mediated Password Strengthening. CT-RSA 2020: 225-253
2010 – 2019
- 2019
- [c47]Milos Grujic, Vladimir Rozic, David Johnston, John Kelsey, Ingrid Verbauwhede:
Design Principles for True Random Number Generators for Security Applications. DAC 2019: 121 - [i7]Peter Mell, John Kelsey, James M. Shook:
Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness. CoRR abs/1906.11011 (2019) - [i6]John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sönmez Turan:
TMPS: Ticket-Mediated Password Strengthening. IACR Cryptol. ePrint Arch. 2019: 543 (2019) - 2018
- [c46]John Kelsey:
The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party. SSR 2018: 164-184 - 2017
- [c45]Peter Mell, John Kelsey, James M. Shook:
Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness. SSS 2017: 410-425 - 2016
- [j6]Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. J. Cryptol. 29(4): 657-696 (2016) - 2015
- [c44]John Kelsey, Kerry A. McKay, Meltem Sönmez Turan:
Predictive Models for Min-entropy Estimation. CHES 2015: 373-392 - [i5]John Kelsey, Kerry A. McKay, Meltem Sönmez Turan:
Predictive Models for Min-Entropy Estimation. IACR Cryptol. ePrint Arch. 2015: 600 (2015) - 2011
- [c43]Stefan Popoveniuc, John Kelsey, Eugen Leontie:
On the Privacy Threats of Electronic Poll Books. SECRYPT 2011: 281-286 - 2010
- [j5]Praveen Gauravaram, John Kelsey, Lars R. Knudsen, Søren S. Thomsen:
On hash functions using checksums. Int. J. Inf. Sec. 9(2): 137-151 (2010) - [c42]Stefan Popoveniuc, John Kelsey, Andrew Regenscheid, Poorvi L. Vora:
Performance Requirements for End-to-End Verifiable Elections. EVT/WOTE 2010 - [c41]John Kelsey, Andrew Regenscheid, Tal Moran, David Chaum:
Attacking Paper-Based E2E Voting Systems. Towards Trustworthy Elections 2010: 370-387 - [i4]John Kelsey, Jon Callas, Alexander Clemm:
Signed Syslog Messages. RFC 5848: 1-40 (2010)
2000 – 2009
- 2009
- [c40]Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey:
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Selected Areas in Cryptography 2009: 393-414 - 2008
- [c39]Praveen Gauravaram, John Kelsey:
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. CT-RSA 2008: 36-51 - [c38]Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions. EUROCRYPT 2008: 270-288 - 2007
- [i3]Praveen Gauravaram, John Kelsey:
Cryptanalysis of a class of cryptographic hash functions. IACR Cryptol. ePrint Arch. 2007: 277 (2007) - 2006
- [c37]John Kelsey, Tadayoshi Kohno:
Herding Hash Functions and the Nostradamus Attack. EUROCRYPT 2006: 183-200 - [c36]John Kelsey, Stefan Lucks:
Collisions and Near-Collisions for Reduced-Round Tiger. FSE 2006: 111-125 - 2005
- [c35]John Kelsey, Bruce Schneier:
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. EUROCRYPT 2005: 474-490 - [i2]John Kelsey, Tadayoshi Kohno:
Herding Hash Functions and the Nostradamus Attack. IACR Cryptol. ePrint Arch. 2005: 281 (2005) - 2004
- [i1]John Kelsey, Bruce Schneier:
Second Preimages on n-bit Hash Functions for Much Less than 2n Work. IACR Cryptol. ePrint Arch. 2004: 304 (2004) - 2003
- [c34]Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346 - 2002
- [c33]John Kelsey:
Compression and Information Leakage of Plaintext. FSE 2002: 263-276 - 2000
- [j4]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. J. Comput. Secur. 8(2/3): 141-158 (2000) - [c32]John Kelsey, Bruce Schneier:
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. AES Candidate Conference 2000: 169-185 - [c31]Tadayoshi Kohno, John Kelsey, Bruce Schneier:
Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211 - [c30]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Niels Ferguson:
Comments on Twofish as an AES Candidate. AES Candidate Conference 2000: 355-356 - [c29]John Kelsey, Tadayoshi Kohno, Bruce Schneier:
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93 - [c28]Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David A. Wagner, Doug Whiting:
Improved Cryptanalysis of Rijndael. FSE 2000: 213-230
1990 – 1999
- 1999
- [j3]John Kelsey, Bruce Schneier:
The Street Performer Protocol and Digital Copyrights. First Monday 4(6) (1999) - [j2]Bruce Schneier, John Kelsey:
Secure Audit Logs to Support Computer Forensics. ACM Trans. Inf. Syst. Secur. 2(2): 159-176 (1999) - [c27]John Kelsey, Bruce Schneier, David A. Wagner:
Mod n Cryptanalysis, with Applications Against RC5P and M6. FSE 1999: 139-155 - [c26]John Kelsey, Bruce Schneier:
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. Recent Advances in Intrusion Detection 1999 - [c25]John Kelsey, Bruce Schneier, Niels Ferguson:
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. Selected Areas in Cryptography 1999: 13-33 - [c24]John Kelsey, Bruce Schneier:
Key-Schedule Cryptanalysis of DEAL. Selected Areas in Cryptography 1999: 118-134 - [c23]John Kelsey, Bruce Schneier:
Authenticating Secure Tokens Using Slow Memory Access. Smartcard 1999 - 1998
- [c22]John Kelsey, Bruce Schneier:
Secure Authentication with Multiple Parallel Keys. CARDIS 1998: 150-156 - [c21]Chris Hall, David A. Wagner, John Kelsey, Bruce Schneier:
Building PRFs from PRPs. CRYPTO 1998: 370-389 - [c20]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. ESORICS 1998: 97-110 - [c19]Chris Hall, John Kelsey, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Financial Cryptography 1998: 309-310 - [c18]Don Coppersmith, David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of TWOPRIME. FSE 1998: 32-48 - [c17]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators. FSE 1998: 168-188 - [c16]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Chris Hall:
On the Twofish Key Schedule. Selected Areas in Cryptography 1998: 27-42 - [c15]David A. Wagner, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier:
Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305 - [c14]Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338 - [c13]Bruce Schneier, John Kelsey:
Cryptographic Support for Secure Logs on Untrusted Machines. USENIX Security Symposium 1998 - [c12]John Kelsey, Bruce Schneier:
Electronic Commerce and the Street Performer. USENIX Workshop on Electronic Commerce 1998 - 1997
- [j1]Bruce Schneier, John Kelsey:
Remote auditing of software outputs using a trusted coprocessor. Future Gener. Comput. Syst. 13(1): 9-18 (1997) - [c11]John Kelsey, Bruce Schneier:
Conditional Purchase Orders. CCS 1997: 117-124 - [c10]David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of the Cellular Encryption Algorithm. CRYPTO 1997: 526-537 - [c9]John Kelsey, Bruce Schneier, David A. Wagner:
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. ICICS 1997: 233-246 - [c8]John Kelsey, Bruce Schneier, Chris Hall, David A. Wagner:
Secure Applications of Low-Entropy Keys. ISW 1997: 121-134 - [c7]John Kelsey, Bruce Schneier, David A. Wagner:
Protocol Interactions and the Chosen Protocol Attack. Security Protocols Workshop 1997: 91-104 - 1996
- [c6]John Kelsey, Bruce Schneier, Chris Hall:
An Authenticated Camera. ACSAC 1996: 24-30 - [c5]Bruce Schneier, John Kelsey:
Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. CARDIS 1996 - [c4]John Kelsey, Bruce Schneier, David A. Wagner:
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. CRYPTO 1996: 237-251 - [c3]Bruce Schneier, John Kelsey, Jay Walker:
Distributed Proctoring. ESORICS 1996: 172-182 - [c2]Bruce Schneier, John Kelsey:
Unbalanced Feistel Networks and Block Cipher Design. FSE 1996: 121-144 - [c1]Bruce Schneier, John Kelsey:
Automatic Event-Stream Notarization Using Digital Signatures. Security Protocols Workshop 1996: 155-169
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint