John Kelsey

Orcid: 0000-0002-3427-1744

According to our database1, John Kelsey authored at least 59 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF.
IACR Trans. Symmetric Cryptol., 2024

2022
Breaking Category Five SPHINCS+ with SHA-256.
IACR Cryptol. ePrint Arch., 2022

Coalition and Threshold Hash-Based Signatures.
IACR Cryptol. ePrint Arch., 2022

Breaking Category Five SPHINCS<sup>+</sup> with SHA-256.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

2019
TMPS: Ticket-Mediated Password Strengthening.
IACR Cryptol. ePrint Arch., 2019

Design Principles for True Random Number Generators for Security Applications.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

2017
Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

2016
New Second-Preimage Attacks on Hash Functions.
J. Cryptol., 2016

2015
Predictive Models for Min-Entropy Estimation.
IACR Cryptol. ePrint Arch., 2015

2011
On the Privacy Threats of Electronic Poll Books.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Signed Syslog Messages.
RFC, May, 2010

On hash functions using checksums.
Int. J. Inf. Sec., 2010

Attacking Paper-Based E2E Voting Systems.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Performance Requirements for End-to-End Verifiable Elections.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

2009
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

2008
Second Preimage Attacks on Dithered Hash Functions.
Proceedings of the Advances in Cryptology, 2008

Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks.
Proceedings of the Topics in Cryptology, 2008

2007
Cryptanalysis of a class of cryptographic hash functions.
IACR Cryptol. ePrint Arch., 2007

2006
Collisions and Near-Collisions for Reduced-Round Tiger.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Herding Hash Functions and the Nostradamus Attack.
IACR Cryptol. ePrint Arch., 2005

2004
Second Preimages on n-bit Hash Functions for Much Less than 2<sup>n</sup> Work.
IACR Cryptol. ePrint Arch., 2004

2003
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2002
Compression and Information Leakage of Plaintext.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

2000
Side Channel Cryptanalysis of Product Ciphers.
J. Comput. Secur., 2000

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Improved Cryptanalysis of Rijndael.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Comments on Twofish as an AES Candidate.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

Preliminary Cryptanalysis of Reduced-Round Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Secure Audit Logs to Support Computer Forensics.
ACM Trans. Inf. Syst. Secur., 1999

The Street Performer Protocol and Digital Copyrights.
First Monday, 1999

Authenticating Secure Tokens Using Slow Memory Access.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Key-Schedule Cryptanalysis of DEAL.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

Mod n Cryptanalysis, with Applications Against RC5P and M6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
Electronic Commerce and the Street Performer.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Cryptographic Support for Secure Logs on Untrusted Machines.
Proceedings of the 7th USENIX Security Symposium, 1998

Cryptanalysis of ORYX.
Proceedings of the Selected Areas in Cryptography '98, 1998

On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of TWOPRIME.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998

Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998

Secure Authentication with Multiple Parallel Keys.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
Remote auditing of software outputs using a trusted coprocessor.
Future Gener. Comput. Syst., 1997

Protocol Interactions and the Chosen Protocol Attack.
Proceedings of the Security Protocols, 1997

Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997

Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
Proceedings of the Information and Communication Security, First International Conference, 1997

Cryptanalysis of the Cellular Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1997

Conditional Purchase Orders.
Proceedings of the CCS '97, 1997

1996
Automatic Event-Stream Notarization Using Digital Signatures.
Proceedings of the Security Protocols, 1996

Unbalanced Feistel Networks and Block Cipher Design.
Proceedings of the Fast Software Encryption, 1996

Distributed Proctoring.
Proceedings of the Computer Security, 1996

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
Proceedings of the Advances in Cryptology, 1996

Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

An Authenticated Camera.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996


  Loading...