Cryptographers' World
 

John Kelsey



22 papers in database with 1437 citations StarStar

H-number: 16

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Praveen Gauravaram,  John Kelsey,  Linear-XOR and Additive Checksums Don't Protect Damg√•rd-Merkle Hashes from Generic Attacks, pp. 36 - 51, CT-RSA 2008.

[Electronic Edition][Cited 13 times ]

2. Elena Andreeva,  Charles Bouillaguet,  Pierre-Alain Fouque,  Jonathan J. Hoch,  John Kelsey,  Adi Shamir,  S√©bastien Zimmer,  Second Preimage Attacks on Dithered Hash Functions, pp. 270 - 288, EUROCRYPT 2008.

[Electronic Edition][Cited 33 times ]

3. John Kelsey,  Tadayoshi Kohno,  Herding Hash Functions and the Nostradamus Attack, pp. 183 - 200, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 98 times Red Star]

4. John Kelsey,  Stefan Lucks,  Collisions and Near-Collisions for Reduced-Round Tiger, pp. 111 - 125, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 22 times ]

5. John Kelsey,  Bruce Schneier,  Second Preimages on n-Bit Hash Functions for Much Less than 2, pp. 474 - 490, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 216 times Red StarRed Star]

6. Niels Ferguson,  Doug Whiting,  Bruce Schneier,  John Kelsey,  Stefan Lucks,  Tadayoshi Kohno,  Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive, pp. 330 - 346, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 92 times Red Star]

7. John Kelsey,  Compression and Information Leakage of Plaintext, pp. 263 - 276, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

8. John Kelsey,  Tadayoshi Kohno,  Bruce Schneier,  Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, pp. 75 - 93, FSE 2000.

[Electronic Edition][Cited 99 times Red Star]

9. Niels Ferguson,  John Kelsey,  Stefan Lucks,  Bruce Schneier,  Michael Stay,  David Wagner,  Doug Whiting,  Improved Cryptanalysis of Rijndael, pp. 213 - 230, FSE 2000.

[Electronic Edition][Cited 206 times Red StarRed Star]

10. John Kelsey,  Bruce Schneier,  Niels Ferguson,  Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator, pp. 13 - 33, SAC 1999.

[Electronic Edition][Cited 67 times Red Star]

11. John Kelsey,  Bruce Schneier,  Key-Schedule Cryptanalysis of DEAL, pp. 118 - 134, SAC 1999.

[Electronic Edition][Cited 14 times ]

12. John Kelsey,  Bruce Schneier,  David Wagner,  Mod n Cryptanalysis, with Applications Against RC5P and M6, pp. 139 - 155, FSE 1999.

[Electronic Edition][Cited 56 times Red Star]

13. David Wagner,  Leone Simpson,  Ed Dawson,  John Kelsey,  William Millan,  Bruce Schneier,  Cryptanalysis of ORYX, pp. 296 - 305, SAC 1998.

[Electronic Edition][Cited 24 times ]

14. Bruce Schneier,  John Kelsey,  Doug Whiting,  David Wagner,  Chris Hall,  On the Twofish Key Schedule, pp. 27 - 42, SAC 1998.

[Electronic Edition][Cited 16 times ]

15. Chris Hall,  David Wagner,  John Kelsey,  Bruce Schneier,  Building PRFs from PRPs, pp. 370 - 389, CRYPTO 1998.

[Electronic Edition][Cited 33 times ]

16. Chris Hall,  John Kelsey,  Vincent Rijmen,  Bruce Schneier,  David Wagner,  Cryptanalysis of SPEED, pp. 319 - 338, SAC 1998.

[Electronic Edition][Cited 4 times ]

17. John Kelsey,  Bruce Schneier,  David Wagner,  Chris Hall,  Cryptanalytic Attacks on Pseudorandom Number Generators, pp. 168 - 188, FSE 1998.

[Electronic Edition][Cited 97 times Red Star]

18. Don Coppersmith,  David Wagner,  Bruce Schneier,  John Kelsey,  Cryptanalysis of TWOPRIME, pp. 32 - 48, FSE 1998.

[Electronic Edition][Cited 7 times ]

19. Chris Hall,  John Kelsey,  Bruce Schneier,  David Wagner,  Cryptanalysis of SPEED, pp. 309 - 310, FC 1998.

[Electronic Edition][Cited 4 times ]

20. David Wagner,  Bruce Schneier,  John Kelsey,  Cryptanalysis of the Cellular Message Encryption Algorithm, pp. 526 - 537, CRYPTO 1997.

[Electronic Edition][Cited 30 times ]

21. John Kelsey,  Bruce Schneier,  David Wagner,  Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, pp. 237 - 251, CRYPTO 1996.

[Electronic Edition][Cited 176 times Red StarRed Star]

22. Bruce Schneier,  John Kelsey,  Unbalanced Feistel Networks and Block Cipher Design, pp. 121 - 144, FSE 1996.

[Electronic Edition][Cited 121 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...