Search filters

List of works by Bruce Schneier

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back

book by Bruce Schneier

A Self-Study Course in Block-Cipher Cryptanalysis

2000 article by Bruce Schneier

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent

Applied Cryptography. Protocols, Algorithms, and Source Code in C

second edition published November 2nd 1995 by Wiley, hardcover

Applied Cryptography: Protocols, Algorithms, and Source Code in C

written work by Bruce Scheier

Applied Cryptography: Protocols, Algorithms, and Source Code in C

first edition published November 10th 1993 by Wiley, Paperback

Applied Cryptography: Protocols, Algorithms, and Source Code in C

second edition published November 1st 1995 by Wiley, paperback

Applied Cryptography: Protocols, Algorithms, and Source Code in C

20th anniversary edition published March 30th 2015 by Wiley, hardcover

Automatic event-stream notarization using digital signatures

Beyond Fear: Thinking Sensibly About Security in an Uncertain World

2003 book by Bruce Schneier

Bruce Schneier: The security mirage

TEDxPSU

Bugs in our Pockets: The Risks of Client-Side Scanning

2021 scholarly article about mobile security

Building PRFs from PRPs

Click Here to Kill Everybody

2018 non-fiction book

Conditional purchase orders

Cryptanalysis of SPEED

Cryptanalysis of SPEED

Cryptanalysis of TWOPRIME

Cryptanalysis of the cellular message encryption algorithm

Cryptanalytic Attacks on Pseudorandom Number Generators

scholarly article

Cryptographie appliquée : protocoles, algorithmes et codes sources en C

2001 French translation by Laurent Viennot of the second edition of Bruce Scheier work

Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)

scientific article

Distributed proctoring

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

Improved Cryptanalysis of Rijndael

IoT Security: What’s Plan B?

journal article from 'IEEE Security & Privacy' published in 2017

Key Schedule Weakness in SAFER+

Key-Schedule Cryptanalysis of DEAL

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

Keys under doormats: mandating insecurity by requiring government access to all data and communications

Scholarly article. Abelson, 2015

Liars and Outliers

book by Bruce Schneier

Liars and Outliers

2012 edition

Mod n Cryptanalysis, with Applications against RC5P and M6

On the Twofish Key Schedule

Protocol interactions and the chosen protocol attack

Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA

article by John Kelsey et al published 1997 in Lecture Notes in Computer Science

Remote auditing of software outputs using a trusted coprocessor

article by Bruce Schneier & John Kelsey published July 1997 in Future Generation Computer Systems

Second Preimages on n-Bit Hash Functions for Much Less than 2ⁿ Work

scholarly article

Secrets & Lies

book by Bruce Schneier

Secure Audit Logs

article

Secure Authentication with Multiple Parallel Keys

Secure Logging

article

Secure applications of low-entropy keys

Secure audit logs to support computer forensics

article published in 1999

Securing Medical Research: A Cybersecurity Point of View

scientific article published on June 22, 2012

Side channel cryptanalysis of product ciphers

The risks of key recovery, key escrow, and trusted third-party encryption

Scholarly article. Abelson, 1997

Unbalanced Feistel networks and block cipher design

article

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator

scholarly article