Cryptographers' World
 

Bruce Schneier


Author's Web Page Link

21 papers and 2 books in database with 9311 citations StarStarStarStarStar

Editor of 1 conference proceedings book

H-number: 18

Books

 
1. Niels FergusonBruce SchneierPractical Cryptography. Wiley, 2003. ISBN 978-0-471-22357-3.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 295 times Red StarRed StarRed Star]


2. Bruce SchneierApplied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, 1996. ISBN 978-0-471-11709-4.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 7223 times Red StarRed StarRed StarRed StarRed StarRed Star]


Conference Proceedings

 
1. Bruce Schneier, editor, Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings. Springer, 2001. ISBN 3-540-41728-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Bruce Schneier,  The Psychology of Security, pp. 50 - 79, AFRICACRYPT 2008.

[Electronic Edition][Cited 34 times ]

2. John Kelsey,  Bruce Schneier,  Second Preimages on n-Bit Hash Functions for Much Less than 2, pp. 474 - 490, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 216 times Red StarRed Star]

3. Niels Ferguson,  Doug Whiting,  Bruce Schneier,  John Kelsey,  Stefan Lucks,  Tadayoshi Kohno,  Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive, pp. 330 - 346, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 92 times Red Star]

4. John Kelsey,  Tadayoshi Kohno,  Bruce Schneier,  Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, pp. 75 - 93, FSE 2000.

[Electronic Edition][Cited 99 times Red Star]

5. Niels Ferguson,  John Kelsey,  Stefan Lucks,  Bruce Schneier,  Michael Stay,  David Wagner,  Doug Whiting,  Improved Cryptanalysis of Rijndael, pp. 213 - 230, FSE 2000.

[Electronic Edition][Cited 206 times Red StarRed Star]

6. John Kelsey,  Bruce Schneier,  Niels Ferguson,  Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator, pp. 13 - 33, SAC 1999.

[Electronic Edition][Cited 67 times Red Star]

7. John Kelsey,  Bruce Schneier,  Key-Schedule Cryptanalysis of DEAL, pp. 118 - 134, SAC 1999.

[Electronic Edition][Cited 14 times ]

8. John Kelsey,  Bruce Schneier,  David Wagner,  Mod n Cryptanalysis, with Applications Against RC5P and M6, pp. 139 - 155, FSE 1999.

[Electronic Edition][Cited 56 times Red Star]

9. David Wagner,  Leone Simpson,  Ed Dawson,  John Kelsey,  William Millan,  Bruce Schneier,  Cryptanalysis of ORYX, pp. 296 - 305, SAC 1998.

[Electronic Edition][Cited 24 times ]

10. Chris Hall,  David Wagner,  John Kelsey,  Bruce Schneier,  Building PRFs from PRPs, pp. 370 - 389, CRYPTO 1998.

[Electronic Edition][Cited 33 times ]

11. Bruce Schneier,  John Kelsey,  Doug Whiting,  David Wagner,  Chris Hall,  On the Twofish Key Schedule, pp. 27 - 42, SAC 1998.

[Electronic Edition][Cited 16 times ]

12. Chris Hall,  John Kelsey,  Vincent Rijmen,  Bruce Schneier,  David Wagner,  Cryptanalysis of SPEED, pp. 319 - 338, SAC 1998.

[Electronic Edition][Cited 4 times ]

13. John Kelsey,  Bruce Schneier,  David Wagner,  Chris Hall,  Cryptanalytic Attacks on Pseudorandom Number Generators, pp. 168 - 188, FSE 1998.

[Electronic Edition][Cited 97 times Red Star]

14. Don Coppersmith,  David Wagner,  Bruce Schneier,  John Kelsey,  Cryptanalysis of TWOPRIME, pp. 32 - 48, FSE 1998.

[Electronic Edition][Cited 7 times ]

15. Chris Hall,  John Kelsey,  Bruce Schneier,  David Wagner,  Cryptanalysis of SPEED, pp. 309 - 310, FC 1998.

[Electronic Edition][Cited 4 times ]

16. David Wagner,  Bruce Schneier,  John Kelsey,  Cryptanalysis of the Cellular Message Encryption Algorithm, pp. 526 - 537, CRYPTO 1997.

[Electronic Edition][Cited 30 times ]

17. Bruce Schneier,  Doug Whiting,  Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor, pp. 242 - 259, FSE 1997.

[Electronic Edition][Cited 45 times ]

18. John Kelsey,  Bruce Schneier,  David Wagner,  Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, pp. 237 - 251, CRYPTO 1996.

[Electronic Edition][Cited 176 times Red StarRed Star]

19. Bruce Schneier,  John Kelsey,  Unbalanced Feistel Networks and Block Cipher Design, pp. 121 - 144, FSE 1996.

[Electronic Edition][Cited 121 times Red StarRed Star]

20. Matt Blaze,  Bruce Schneier,  The MacGuffin Block Cipher Algorithm, pp. 97 - 110, FSE 1994.

[Electronic Edition][Cited 19 times ]

21. Bruce Schneier,  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), pp. 191 - 204, FSE 1993.

[Electronic Edition][Cited 433 times Red StarRed StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...