Papers in the Category “Algorithm Analyses”

J. Kelsey and B. Schneier, Second Preimages on n-bit Hash Functions for Much Less than 2n Work, Advances in Cryptology: EUROCRYPT 2005 Proceedings, Springer-Verlag, 2005, pp. 474-490.

N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and D. Whiting, Improved Cryptanalysis of Rijndael, Seventh Fast Software Encryption Workshop, Springer-Verlag, 2001, pp. 213-230.

J. Kelsey, T. Kohno, and B. Schneier, Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, Seventh Fast Software Encryption Workshop, Springer-Verlag, 2001, pp. 7-93.

N. Ferguson, B. Schneier, and D. Wagner, Security Weaknesses in Maurer-Like Randomized Stream Ciphers, Fifth Australasian Conference on Information Security and Privacy (ACISP 2000), Springer-Verlag, 2000, pp. 234-241.

J. Kelsey and B. Schneier, MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants, Proceedings of the Third AES Candidate Conference, April 2000, pp. 169-185.

T. Kohno, J. Kelsey, and B. Schneier, Preliminary Cryptanalysis of Reduced-Round Serpent, Proceedings of the Third AES Candidate Conference, April 2000, pp. 195-211.

J. Kelsey, B. Schneier, D. Wagner, and C. Hall, Side Channel Cryptanalysis of Product Ciphers, Journal of Computer Security, v. 8, n. 2-3, 2000, pp. 141-158.

J. Kelsey and B. Schneier, Key-Schedule Cryptanalysis of DEAL, Sixth Annual Workshop on Selected Areas in Cryptography, Springer Verlag, August 1999.

E. Biham, A. Biryukov, N. Ferguson, L. Knudsen, B. Schneier, and A. Shamir, Cryptanalysis of Magenta, Second AES Candidate Conference, April 1999.

D. Wagner, N. Ferguson, and B. Schneier, Cryptanalysis of FROG, Second AES Candiate Conference, April 1999, pp. 175–181.

J. Kelsey, B. Schneier, and D. Wagner, Key Schedule Weakness in SAFER+, Second AES Candidate Conference, April 1999.

J. Kelsey, B. Schneier, and D. Wagner, Mod n Cryptanalysis, with Applications against RC5P and M6, Fast Software Encryption, Sixth International Workshop Proceedings (March 1999), Springer-Verlag, 1999, pp. 139-155.

C. Hall, J. Kelsey, V. Rijmen, B. Schneier, and D. Wagner., Cryptanalysis of SPEED, Fifth Annual Workshop on Selected Areas in Cryptography, Springer-Verlag, August 1998, pp. 319-338.

D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan, and B. Schneier, Cryptanalysis of ORYX, Fifth Annual Workshop on Selected Areas in Cryptography, Springer-Verlag, August 1998, pp. 296-305.

C. Hall, J. Kelsey, and B. Schneier and D. Wagner, Cryptanalysis of SPEED (Extended Abstract), Financial Cryptography '98, Springer-Verlag, 1998, pp. 309-310.

Don Coppersmith, David Wagner, Bruce Schneier, and John Kelsey, Cryptanalysis of TWOPRIME, Fast Software Encryption, Fifth International Workshop Proceedings (March 1998), Springer-Verlag, 1998, pp. 32-48.

J. Kelsey, B. Schneier, and D. Wagner, Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA, ICICS '97 Proceedings, Springer-Verlag, November 1997, pp. 233-246.

D. Wagner, B. Schneier, and J. Kelsey, Cryptanalysis of the Cellular Message Encryption Algorithm, March 20, 1997.

N. Ferguson and B. Schneier, Cryptanalysis of Akelarre, Fourth Annual Workshop on Selected Areas in Cryptography, August 1997, pp. 201-212.

J. Kelsey, B. Schneier, and D. Wagner, Key-Schedule Cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES, Advances in Cryptology--CRYPTO '96 Proceedings, Springer-Verlag, August 1996, pp. 237-251.

B. Schneier, The GOST Encryption Algorithm, Dr. Dobb's Journal, v. 20, n.1, January 1995, pp. 123-124.

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.