Bruce Schneier

According to our database1, Bruce Schneier
  • authored at least 137 papers between 1993 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Artificial Intelligence and the Attack/Defense Balance.
IEEE Security & Privacy, 2018

2017
IoT Security: What's Plan B?
IEEE Security & Privacy, 2017

The Internet of Things Will Upend Our Industry.
IEEE Security & Privacy, 2017

2016
Stop Trying to Fix the User.
IEEE Security & Privacy, 2016

Cryptography Is Harder than It Looks.
IEEE Security & Privacy, 2016

2015
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement.
RFC, August, 2015

The Security Value of Muddling Through.
IEEE Security & Privacy, 2015

Surreptitiously Weakening Cryptographic Systems.
IACR Cryptology ePrint Archive, 2015

Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecurity, 2015

Keys under doormats.
Commun. ACM, 2015

2014
The Future of Incident Response.
IEEE Security & Privacy, 2014

Metadata = Surveillance.
IEEE Security & Privacy, 2014

2013
Trust in Man/Machine Security Systems.
IEEE Security & Privacy, 2013

IT for Oppression.
IEEE Security & Privacy, 2013

2012
The Importance of Security Engineering.
IEEE Security & Privacy, 2012

How Changing Technology Affects Security.
IEEE Security & Privacy, 2012

2011
Solitaire.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Empathy and Security.
IEEE Security & Privacy, 2011

Detecting Cheaters.
IEEE Security & Privacy, 2011

2010
Special issue on security and trust management for dynamic coalitions.
Security and Communication Networks, 2010

A Taxonomy of Social Networking Data.
IEEE Security & Privacy, 2010

Security and Function Creep.
IEEE Security & Privacy, 2010

Cryptography Engineering - Design Principles and Practical Applications.
Wiley, ISBN: 978-0-470-47424-2, 2010

2009
Security, Group Size, and the Human Brain.
IEEE Security & Privacy, 2009

Architecture of Privacy.
IEEE Security & Privacy, 2009

2008
How the Human Brain Buys Security.
IEEE Security & Privacy, 2008

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

The Psychology of Security.
Proceedings of the Progress in Cryptology, 2008

Schneier on security.
Wiley, ISBN: 978-0-470-39535-6, 2008

2007
The Death of the Security Industry.
IEEE Security & Privacy, 2007

Nonsecurity Considerations in Security Decisions.
IEEE Security & Privacy, 2007

The psychology of security.
Commun. ACM, 2007

2006
University Networks and Data Security.
IEEE Security & Privacy, 2006

Beyond fear - thinking sensibly about security in an uncertain world.
Springer, ISBN: 978-0-387-02620-6, 2006

Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C: der Klassiker.
Pearson Education, ISBN: 978-3-8273-7228-4, 2006

2005
Attacks on Cryptographic Hashes in Internet Protocols.
RFC, November, 2005

Solitaire.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Attack trends: 2004 and 2005.
ACM Queue, 2005

The Zotob Storm.
IEEE Security & Privacy, 2005

Authentication and Expiration.
IEEE Security & Privacy, 2005

Guest Editors' Introduction: Economics of Information Security.
IEEE Security & Privacy, 2005

Risks of third-party data.
Commun. ACM, 2005

Two-factor authentication: too little, too late.
Commun. ACM, 2005

Second Preimages on n-Bit Hash Functions for Much Less than 2n Work.
Proceedings of the Advances in Cryptology, 2005

2004
Evaluating Security Systems: A Five-Step Process.
Proceedings of the Economics of Information Security, 2004

Sensible Authentication.
ACM Queue, 2004

SIMS: Solution, or Part of the Problem?
IEEE Security & Privacy, 2004

Customers, Passwords, and Web Sites.
IEEE Security & Privacy, 2004

Security and Compliance.
IEEE Security & Privacy, 2004

Voting Security and Technology.
IEEE Security & Privacy, 2004

Second Preimages on n-bit Hash Functions for Much Less than 2n Work.
IACR Cryptology ePrint Archive, 2004

Hacking the Business Climate for Network Security.
IEEE Computer, 2004

The nonsecurity of secrecy.
Commun. ACM, 2004

Insider risks in elections.
Commun. ACM, 2004

Secrets and lies - digital security in a networked world: with new information about post-9/11 security.
Wiley, ISBN: 978-0-471-45380-2, 2004

Secrets and lies - IT-Sicherheit in einer vernetzten Welt.
dpunkt.verlag, ISBN: 978-3-89864-302-3, 2004

2003
Airplane Hackers.
IEEE Security & Privacy, 2003

The Speed of Security.
IEEE Security & Privacy, 2003

Guilty Until Proven Innocent?
IEEE Security & Privacy, 2003

Locks and Full Disclosure.
IEEE Security & Privacy, 2003

We Are All Security Consumers.
IEEE Security & Privacy, 2003

Voting and technology: who gets to count your vote?
Commun. ACM, 2003

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Practical cryptography.
Wiley, ISBN: 978-0-471-22357-3, 2003

2002
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.
Proceedings of the Information Security, 5th International Conference, 2002

2001
Managed Security Monitoring: Network Security for the 21st Centur.
Computers & Security, 2001

The perils of port 80.
Commun. ACM, 2001

Cyber underwriters lab.
Commun. ACM, 2001

Insurance and the computer industry.
Commun. ACM, 2001

2000
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security, 2000

Protecting secret keys with personal entropy.
Future Generation Comp. Syst., 2000

A Self-Study Course in Block-Cipher Cryptanalysis.
Cryptologia, 2000

Semantic network attacks.
Commun. ACM, 2000

Risks of PKI: E-Commerce.
Commun. ACM, 2000

Risks of PKI: Secure Email.
Commun. ACM, 2000

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols.
Proceedings of the 9th USENIX Security Symposium, 2000

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Improved Cryptanalysis of Rijndael.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

A Performance Comparison of the Five AES Finalists.
AES Candidate Conference, 2000

Comments on Twofish as an AES Candidate.
AES Candidate Conference, 2000

Preliminary Cryptanalysis of Reduced-Round Serpent.
AES Candidate Conference, 2000

MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants.
AES Candidate Conference, 2000

Security Weaknesses in a Randomized Stream Cipher.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Secure Audit Logs to Support Computer Forensics.
ACM Trans. Inf. Syst. Secur., 1999

The Street Performer Protocol and Digital Copyrights.
First Monday, 1999

Cryptography: The Importance of Not Being Different.
IEEE Computer, 1999

Risks of Relying on Cryptography.
Commun. ACM, 1999

The Trojan Horse Race.
Commun. ACM, 1999

The Uses and Abuses of Biometrics.
Commun. ACM, 1999

Authenticating Secure Tokens Using Slow Memory Access.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Key-Schedule Cryptanalysis of DEAL.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Recent Advances in Intrusion Detection, 1999

Reaction Attacks against several Public-Key Cryptosystems.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Mod n Cryptanalysis, with Applications Against RC5P and M6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2).
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
Security pitfalls in cryptographic design.
Inf. Manag. Comput. Security, 1998

Cryptographic Design Vulnerabilities.
IEEE Computer, 1998

Electronic Commerce and the Street Performer.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Cryptographic Support for Secure Logs on Untrusted Machines.
Proceedings of the 7th USENIX Security Symposium, 1998

Cryptanalysis of ORYX.
Proceedings of the Selected Areas in Cryptography '98, 1998

On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998

Toward a Secure System Engineering Methodolgy.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

Environmental Key Generation Towards Clueless Agents.
Proceedings of the Mobile Agents and Security, 1998

Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of TWOPRIME.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998

Side Channel Cryptanalysis of Product Ciphers.
Proceedings of the Computer Security, 1998

Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998

Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP).
Proceedings of the CCS '98, 1998

Twofish on Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Secure Authentication with Multiple Parallel Keys.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

A Certified E-Mail Protocol.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web Journal, 1997

Remote auditing of software outputs using a trusted coprocessor.
Future Generation Comp. Syst., 1997

Cryptography, Security, and the Future.
Commun. ACM, 1997

Protocol Interactions and the Chosen Protocol Attack.
Proceedings of the Security Protocols, 1997

Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997

Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
Proceedings of the Information and Communication Security, First International Conference, 1997

Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Cryptanalysis of the Cellular Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1997

Conditional Purchase Orders.
Proceedings of the CCS '97, 1997

An Improved E-Mail Security Protocol.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Remote Electronic Gambling.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
Securing the World Wide Web: Smart Tokens and Their Implementation.
World Wide Web Journal, 1996

Automatic Event-Stream Notarization Using Digital Signatures.
Proceedings of the Security Protocols, 1996

Unbalanced Feistel Networks and Block Cipher Design.
Proceedings of the Fast Software Encryption, 1996

Distributed Proctoring.
Proceedings of the Computer Security, 1996

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
Proceedings of the Advances in Cryptology, 1996

Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

An Authenticated Camera.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C.
Informationssicherheit, Addison-Wesley, ISBN: 978-3-89319-854-2, 1996

Applied cryptography - protocols, algorithms, and source code in C, 2nd Edition.
Wiley, ISBN: 0-471-12845-7, 1996

1994
Designing encryption algorithms for real people.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994

The MacGuffin Block Cipher Algorithm.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

1993
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish).
Proceedings of the Fast Software Encryption, 1993


  Loading...