The following pages link to John Kelsey (Q321300):
Displaying 29 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- TMPS: ticket-mediated password strengthening (Q785019) (← links)
- Predictive models for min-entropy estimation (Q1695888) (← links)
- (Q3046363) (← links)
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES (Q3452355) (← links)
- Herding Hash Functions and the Nostradamus Attack (Q3593096) (← links)
- Collisions and Near-Collisions for Reduced-Round Tiger (Q3618647) (← links)
- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård (Q3651273) (← links)
- (Q4249345) (← links)
- (Q4250804) (← links)
- (Q4250825) (← links)
- (Q4250827) (← links)
- (Q4251011) (← links)
- (Q4364575) (← links)
- (Q4373634) (← links)
- (Q4387317) (← links)
- (Q4537984) (← links)
- (Q4537993) (← links)
- Unbalanced Feistel networks and block cipher design (Q4593790) (← links)
- Cryptanalysis of TWOPRIME (Q4639438) (← links)
- Cryptanalytic Attacks on Pseudorandom Number Generators (Q4639448) (← links)
- (Q4941809) (← links)
- (Q4949324) (← links)
- (Q4949331) (← links)
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work (Q5385746) (← links)
- Second Preimage Attacks on Dithered Hash Functions (Q5458597) (← links)
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks (Q5458931) (← links)
- Side channel cryptanalysis of product ciphers (Q5862295) (← links)
- Fast Software Encryption (Q5902496) (← links)