Search filters

List of works by John Kelsey

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent

An authenticated camera

scholarly article

Attacking Paper-Based E2E Voting Systems

article

Automatic event-stream notarization using digital signatures

Building PRFs from PRPs

Collisions and Near-Collisions for Reduced-Round Tiger

Compression and Information Leakage of Plaintext

Conditional purchase orders

Cryptanalysis of ORYX

Cryptanalysis of SPEED

Cryptanalysis of SPEED

Cryptanalysis of TWOPRIME

Cryptanalysis of the cellular message encryption algorithm

Cryptanalytic Attacks on Pseudorandom Number Generators

scholarly article

Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness

conference paper published in 2017

Distributed proctoring

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

Herding Hash Functions and the Nostradamus Attack

article

Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård

Improved Cryptanalysis of Rijndael

Key Schedule Weakness in SAFER+

Key-Schedule Cryptanalysis of DEAL

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks

Mod n Cryptanalysis, with Applications against RC5P and M6

New Second-Preimage Attacks on Hash Functions

On hash functions using checksums

article

On the Twofish Key Schedule

Predictive Models for Min-entropy Estimation

article published in 2015

Protocol interactions and the chosen protocol attack

Recommendation for the entropy sources used for random bit generation

Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA

article by John Kelsey et al published 1997 in Lecture Notes in Computer Science

Remote auditing of software outputs using a trusted coprocessor

article by Bruce Schneier & John Kelsey published July 1997 in Future Generation Computer Systems

Second Preimage Attacks on Dithered Hash Functions

scholarly article

Second Preimages on n-Bit Hash Functions for Much Less than 2ⁿ Work

scholarly article

Secure Authentication with Multiple Parallel Keys

Secure applications of low-entropy keys

Secure audit logs to support computer forensics

article published in 1999

Side channel cryptanalysis of product ciphers

Unbalanced Feistel networks and block cipher design

article

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator

scholarly article