Papers in the Category “Protocol Analyses”
N. Ferguson and B. Schneier, A Cryptographic Evaluation of IPsec, December 2003.
K. Jallad, J. Katz, and B. Schneier, Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG, Information Security Conference 2002 Proceedings, Springer-Verlag, 2002, pp. 90-101.
J. Katz and B. Schneier, A Chosen Ciphertext Attack against Several E-Mail Encryption Protocols, 9th USENIX Security Symposium, 2000.
B. Schneier, Mudge, Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2), CQRE '99, Springer-Verlag, 1999, pp. 192-203.
C. Hall, I. Goldberg, and B. Schneier, Reaction Attacks Against Several Public-Key Cryptosystems, Proceedings of Information and Communication Security, ICICS'99, Springer-Verlag, 1999, pp. 2-12.
B. Schneier and Mudge, Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP), Proceedings of the 5th ACM Conference on Communications and Computer Security, ACM Press, November 1998, pp. 132-141.
J. Kelsey, B. Schneier, and D. Wagner, Protocol Interactions and the Chosen Protocol Attack, Security Protocols, 5th International Workshop April 1997 Proceedings, Springer-Verlag, 1998, pp. 91-104.
D. Wagner and B. Schneier, Analysis of the SSL 3.0 Protocol, The Second USENIX Workshop on Electronic Commerce Proceedings, USENIX Press, November 1996, pp. 29-40.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient, an IBM Company.