John Kelsey

According to our database1, John Kelsey authored at least 56 papers between 1996 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

2016
New Second-Preimage Attacks on Hash Functions.
J. Cryptology, 2016

2015
Predictive Models for Min-Entropy Estimation.
IACR Cryptology ePrint Archive, 2015

Predictive Models for Min-entropy Estimation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2011
On the Privacy Threats of Electronic Poll Books.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Signed Syslog Messages.
RFC, May, 2010

On hash functions using checksums.
Int. J. Inf. Sec., 2010

Attacking Paper-Based E2E Voting Systems.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Performance Requirements for End-to-End Verifiable Elections.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

2009
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

2008
Second Preimage Attacks on Dithered Hash Functions.
Proceedings of the Advances in Cryptology, 2008

Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks.
Proceedings of the Topics in Cryptology, 2008

2007
Cryptanalysis of a class of cryptographic hash functions.
IACR Cryptology ePrint Archive, 2007

2006
Collisions and Near-Collisions for Reduced-Round Tiger.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Herding Hash Functions and the Nostradamus Attack.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
Herding Hash Functions and the Nostradamus Attack.
IACR Cryptology ePrint Archive, 2005

Second Preimages on n-Bit Hash Functions for Much Less than 2n Work.
Proceedings of the Advances in Cryptology, 2005

2004
Second Preimages on n-bit Hash Functions for Much Less than 2n Work.
IACR Cryptology ePrint Archive, 2004

2003
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2002
Compression and Information Leakage of Plaintext.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

2000
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security, 2000

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Improved Cryptanalysis of Rijndael.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Comments on Twofish as an AES Candidate.
AES Candidate Conference, 2000

Preliminary Cryptanalysis of Reduced-Round Serpent.
AES Candidate Conference, 2000

MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants.
AES Candidate Conference, 2000

1999
Secure Audit Logs to Support Computer Forensics.
ACM Trans. Inf. Syst. Secur., 1999

The Street Performer Protocol and Digital Copyrights.
First Monday, 1999

Authenticating Secure Tokens Using Slow Memory Access.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Key-Schedule Cryptanalysis of DEAL.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Recent Advances in Intrusion Detection, 1999

Mod n Cryptanalysis, with Applications Against RC5P and M6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
Electronic Commerce and the Street Performer.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Cryptographic Support for Secure Logs on Untrusted Machines.
Proceedings of the 7th USENIX Security Symposium, 1998

Cryptanalysis of ORYX.
Proceedings of the Selected Areas in Cryptography '98, 1998

On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of TWOPRIME.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998

Side Channel Cryptanalysis of Product Ciphers.
Proceedings of the Computer Security, 1998

Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998

Secure Authentication with Multiple Parallel Keys.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
Remote auditing of software outputs using a trusted coprocessor.
Future Generation Comp. Syst., 1997

Protocol Interactions and the Chosen Protocol Attack.
Proceedings of the Security Protocols, 1997

Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997

Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
Proceedings of the Information and Communication Security, First International Conference, 1997

Cryptanalysis of the Cellular Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1997

Conditional Purchase Orders.
Proceedings of the CCS '97, 1997

1996
Automatic Event-Stream Notarization Using Digital Signatures.
Proceedings of the Security Protocols, 1996

Unbalanced Feistel Networks and Block Cipher Design.
Proceedings of the Fast Software Encryption, 1996

Distributed Proctoring.
Proceedings of the Computer Security, 1996

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
Proceedings of the Advances in Cryptology, 1996

Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

An Authenticated Camera.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996


  Loading...