default search action
Bruce Schneier
Person information
- award (2007): EFF Pioneer Award
- affiliation: Harvard Kennedy School, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j85]Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park:
Devising and Detecting Phishing Emails Using Large Language Models. IEEE Access 12: 42131-42146 (2024) - [j84]Bruce Schneier:
LLMs' Data-Control Path Insecurity. Commun. ACM 67(9): 31-32 (2024) - [j83]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [i13]Christopher Summerfield, Lisa Argyle, Michiel A. Bakker, Teddy Collins, Esin Durmus, Tyna Eloundou, Iason Gabriel, Deep Ganguli, Kobi Hackenburg, Gillian K. Hadfield, Luke Hewitt, Saffron Huang, Helene Landemore, Nahema Marchal, Aviv Ovadya, Ariel Procaccia, Mathias Risse, Bruce Schneier, Elizabeth Seger, Divya Siddarth, Henrik Skaug Sætra, MH Tessler, Matthew Botvinick:
How will advanced AI systems impact democracy? CoRR abs/2409.06729 (2024) - 2023
- [j82]Bruce Schneier:
Trustworthy AI Means Public AI [Last Word]. IEEE Secur. Priv. 21(6): 95-96 (2023) - [i12]Nathan E. Sanders, Alex Ulinich, Bruce Schneier:
Demonstrations of the Potential of AI-based Political Issue Polling. CoRR abs/2307.04781 (2023) - [i11]Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein:
Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models. CoRR abs/2308.12287 (2023) - [i10]Stephen Farrell, Farzaneh Badii, Bruce Schneier, Steven M. Bellovin:
Reflections on Ten Years Past the Snowden Revelations. RFC 9446: 1-29 (2023) - 2022
- [j81]Bruce Schneier:
Robot Hacking Games. IEEE Secur. Priv. 20(1): 119-120 (2022) - [j80]Bruce Schneier:
NIST's Post-Quantum Cryptography Standards Competition. IEEE Secur. Priv. 20(5): 107-108 (2022) - 2021
- [j79]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j78]Bruce Schneier:
What Will It Take? IEEE Secur. Priv. 19(3): 63-64 (2021) - [c55]Bruce Schneier:
Invited Talk: The Coming AI Hackers. CSCML 2021: 336-360 - [i9]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - [i8]Nathan E. Sanders, Bruce Schneier:
Machine Learning Featurizations for AI Hacking of Political Systems. CoRR abs/2110.09231 (2021) - 2020
- [j77]Bruce Schneier:
Attacking Machine Learning Systems. Computer 53(5): 78-80 (2020) - [j76]Karen Levy, Bruce Schneier:
Privacy threats in intimate relationships. J. Cybersecur. 6(1): tyaa006 (2020) - [j75]Bruce Schneier:
Technologists vs. Policy Makers. IEEE Secur. Priv. 18(1): 72-71 (2020) - [j74]Bruce Schneier:
Hacking the Tax Code. IEEE Secur. Priv. 18(5): 79-80 (2020) - [i7]Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar:
Politics of Adversarial Machine Learning. CoRR abs/2002.05648 (2020) - [i6]Karen Levy, Bruce Schneier:
Privacy threats in intimate relationships. CoRR abs/2006.03907 (2020) - [i5]Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert:
Legal Risks of Adversarial Machine Learning Research. CoRR abs/2006.16179 (2020)
2010 – 2019
- 2019
- [j73]Bruce Schneier:
Cybersecurity for the Public Interest. IEEE Secur. Priv. 17(1): 84-83 (2019) - 2018
- [j72]Bruce Schneier:
Artificial Intelligence and the Attack/Defense Balance. IEEE Secur. Priv. 16(2): 96 (2018) - [j71]Bruce Schneier:
Cryptography after the Aliens Land. IEEE Secur. Priv. 16(5): 86-88 (2018) - [j70]Bruce Schneier:
Unnoticed Consent [Last Word]. IEEE Secur. Priv. 16(6): 80-79 (2018) - 2017
- [j69]Bruce Schneier:
The Internet of Things Will Upend Our Industry. IEEE Secur. Priv. 15(2): 108 (2017) - [j68]Bruce Schneier:
IoT Security: What's Plan B? IEEE Secur. Priv. 15(5): 96 (2017) - 2016
- [j67]Bruce Schneier:
Cryptography Is Harder than It Looks. IEEE Secur. Priv. 14(1): 87-88 (2016) - [j66]Bruce Schneier:
Stop Trying to Fix the User. IEEE Secur. Priv. 14(5): 96 (2016) - 2015
- [j65]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j64]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j63]Bruce Schneier:
The Security Value of Muddling Through. IEEE Secur. Priv. 13(2): 108 (2015) - [j62]Bruce Schneier:
Ubiquitous Surveillance and Security [Keynote]. IEEE Technol. Soc. Mag. 34(3): 39-40 (2015) - [i4]Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. IACR Cryptol. ePrint Arch. 2015: 97 (2015) - [i3]Richard L. Barnes, Bruce Schneier, Cullen Jennings, Ted Hardie, Brian Trammell, Christian Huitema, Daniel Borkmann:
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement. RFC 7624: 1-24 (2015) - 2014
- [j61]Bruce Schneier:
Metadata = Surveillance. IEEE Secur. Priv. 12(2): 84 (2014) - [j60]Bruce Schneier:
The Future of Incident Response. IEEE Secur. Priv. 12(5): 96 (2014) - 2013
- [j59]Bruce Schneier:
IT for Oppression. IEEE Secur. Priv. 11(2): 96 (2013) - [j58]Bruce Schneier:
Trust in Man/Machine Security Systems. IEEE Secur. Priv. 11(5): 96 (2013) - [e3]Bruce Schneier:
Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, WEIS 2011]. Springer 2013, ISBN 978-1-4614-1980-8 [contents] - 2012
- [j57]Bruce Schneier:
How Changing Technology Affects Security. IEEE Secur. Priv. 10(2): 104 (2012) - [j56]Bruce Schneier:
The Importance of Security Engineering. IEEE Secur. Priv. 10(5): 88 (2012) - 2011
- [j55]Bruce Schneier:
Detecting Cheaters. IEEE Secur. Priv. 9(2): 96 (2011) - [j54]Bruce Schneier:
Empathy and Security. IEEE Secur. Priv. 9(5): 88 (2011) - [r2]Bruce Schneier:
Solitaire. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1229-1230 - 2010
- [b9]Niels Ferguson, Bruce Schneier, Tadayoshi Kohno:
Cryptography Engineering - Design Principles and Practical Applications. Wiley 2010, ISBN 978-0-470-47424-2, pp. I-XXIX, 1-353 - [j53]Bruce Schneier:
Security and Function Creep. IEEE Secur. Priv. 8(1): 88 (2010) - [j52]Bruce Schneier:
A Taxonomy of Social Networking Data. IEEE Secur. Priv. 8(4): 88 (2010) - [j51]Bruce Schneier:
Schneier on Security: Privacy and Control. J. Priv. Confidentiality 2(1) (2010) - [j50]Theo Dimitrakos, Fabio Martinelli, Bruce Schneier:
Special issue on security and trust management for dynamic coalitions. Secur. Commun. Networks 3(6): 453-455 (2010)
2000 – 2009
- 2009
- [j49]Bruce Schneier:
Architecture of Privacy. IEEE Secur. Priv. 7(1): 88 (2009) - [j48]Bruce Schneier:
Security, Group Size, and the Human Brain. IEEE Secur. Priv. 7(4): 88 (2009) - 2008
- [b8]Bruce Schneier:
Schneier on security. Wiley 2008, ISBN 978-0-470-39535-6, pp. I-VIII, 1-328 - [j47]Bruce Schneier:
How the Human Brain Buys Security. IEEE Secur. Priv. 6(4): 80 (2008) - [c54]Bruce Schneier:
The Psychology of Security. AFRICACRYPT 2008: 50-79 - [c53]Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008 - 2007
- [j46]Bruce Schneier:
The psychology of security. Commun. ACM 50(5): 128 (2007) - [j45]Bruce Schneier:
Nonsecurity Considerations in Security Decisions. IEEE Secur. Priv. 5(3): 88 (2007) - [j44]Bruce Schneier:
The Death of the Security Industry. IEEE Secur. Priv. 5(6): 88 (2007) - 2006
- [b7]Bruce Schneier:
Beyond fear - thinking sensibly about security in an uncertain world. Springer 2006, ISBN 978-0-387-02620-6, pp. 1-295 - [b6]Bruce Schneier:
Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C: der Klassiker. Pearson Education 2006, ISBN 978-3-8273-7228-4, pp. I-XXII, 1-844 - [j43]Bruce Schneier:
University Networks and Data Security. IEEE Secur. Priv. 4(5): 88-88 (2006) - 2005
- [j42]Bruce Schneier:
Two-factor authentication: too little, too late. Commun. ACM 48(4): 136 (2005) - [j41]Bruce Schneier:
Risks of third-party data. Commun. ACM 48(5): 136 (2005) - [j40]Ross J. Anderson, Bruce Schneier:
Guest Editors' Introduction: Economics of Information Security. IEEE Secur. Priv. 3(1): 12-13 (2005) - [j39]Bruce Schneier:
Authentication and Expiration. IEEE Secur. Priv. 3(1): 88 (2005) - [j38]Bruce Schneier:
The Zotob Storm. IEEE Secur. Priv. 3(6): 96 (2005) - [j37]Bruce Schneier:
Attack trends: 2004 and 2005. ACM Queue 3(5): 52-53 (2005) - [c52]John Kelsey, Bruce Schneier:
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. EUROCRYPT 2005: 474-490 - [r1]Bruce Schneier:
Solitaire. Encyclopedia of Cryptography and Security 2005 - [i2]Paul E. Hoffman, Bruce Schneier:
Attacks on Cryptographic Hashes in Internet Protocols. RFC 4270: 1-12 (2005) - 2004
- [b5]Bruce Schneier:
Secrets and lies - IT-Sicherheit in einer vernetzten Welt. dpunkt.verlag 2004, ISBN 978-3-89864-302-3, pp. I-XI, 1-408 - [b4]Bruce Schneier:
Secrets and lies - digital security in a networked world: with new information about post-9/11 security. Wiley 2004, ISBN 978-0-471-45380-2, pp. I-XIII, 1-414 - [j36]Paul C. Kocher, Bruce Schneier:
Insider risks in elections. Commun. ACM 47(7): 104 (2004) - [j35]Bruce Schneier:
The nonsecurity of secrecy. Commun. ACM 47(10): 120 (2004) - [j34]Bruce Schneier:
Hacking the Business Climate for Network Security. Computer 37(4): 87-89 (2004) - [j33]Bruce Schneier:
Voting Security and Technology. IEEE Secur. Priv. 2(1): 84 (2004) - [j32]Bruce Schneier:
Security and Compliance. IEEE Secur. Priv. 2(3): 96 (2004) - [j31]Bruce Schneier:
Customers, Passwords, and Web Sites. IEEE Secur. Priv. 2(4): 88 (2004) - [j30]Bruce Schneier:
SIMS: Solution, or Part of the Problem? IEEE Secur. Priv. 2(5): 88 (2004) - [j29]Bruce Schneier:
Sensible Authentication. ACM Queue 1(10): 74-78 (2004) - [p1]Bruce Schneier:
Evaluating Security Systems: A Five-Step Process. Economics of Information Security 2004: 289-293 - [i1]John Kelsey, Bruce Schneier:
Second Preimages on n-bit Hash Functions for Much Less than 2n Work. IACR Cryptol. ePrint Arch. 2004: 304 (2004) - 2003
- [b3]Niels Ferguson, Bruce Schneier:
Practical cryptography. Wiley 2003, ISBN 978-0-471-22357-3, pp. I-XX, 1-410 - [j28]David L. Dill, Bruce Schneier, Barbara Simons:
Voting and technology: who gets to count your vote? Commun. ACM 46(8): 29-31 (2003) - [j27]Bruce Schneier:
We Are All Security Consumers. IEEE Secur. Priv. 1(1): 104 (2003) - [j26]Bruce Schneier:
Locks and Full Disclosure. IEEE Secur. Priv. 1(2): 88 (2003) - [j25]Bruce Schneier:
Guilty Until Proven Innocent? IEEE Secur. Priv. 1(3): 88, 87 (2003) - [j24]Bruce Schneier:
The Speed of Security. IEEE Secur. Priv. 1(4): 96 (2003) - [j23]Bruce Schneier:
Airplane Hackers. IEEE Secur. Priv. 1(6): 92 (2003) - [c51]Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346 - 2002
- [c50]Kahil Jallad, Jonathan Katz, Bruce Schneier:
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. ISC 2002: 90-101 - 2001
- [j22]Bruce Schneier:
Insurance and the computer industry. Commun. ACM 44(3): 114-115 (2001) - [j21]Bruce Schneier:
Cyber underwriters lab. Commun. ACM 44(4): 128 (2001) - [j20]Stephan Somogyi, Bruce Schneier:
The perils of port 80. Commun. ACM 44(10): 168 (2001) - [j19]Bruce Schneier:
Managed Security Monitoring: Network Security for the 21st Centur. Comput. Secur. 20(6): 491-503 (2001) - [e2]Bruce Schneier:
Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings. Lecture Notes in Computer Science 1978, Springer 2001, ISBN 3-540-41728-1 [contents] - 2000
- [j18]Carl M. Ellison, Bruce Schneier:
Risks of PKI: Secure Email. Commun. ACM 43(1): 160 (2000) - [j17]Carl M. Ellison, Bruce Schneier:
Risks of PKI: E-Commerce. Commun. ACM 43(2): 152 (2000) - [j16]Bruce Schneier:
Semantic network attacks. Commun. ACM 43(12): 168 (2000) - [j15]Bruce Schneier:
A Self-Study Course in Block-Cipher Cryptanalysis. Cryptologia 24(1): 18-33 (2000) - [j14]Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier:
Protecting secret keys with personal entropy. Future Gener. Comput. Syst. 16(4): 311-318 (2000) - [j13]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. J. Comput. Secur. 8(2/3): 141-158 (2000) - [c49]Niels Ferguson, Bruce Schneier, David A. Wagner:
Security Weaknesses in a Randomized Stream Cipher. ACISP 2000: 234-241 - [c48]Bruce Schneier, Doug Whiting:
A Performance Comparison of the Five AES Finalists. AES Candidate Conference 2000: 123-135 - [c47]John Kelsey, Bruce Schneier:
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. AES Candidate Conference 2000: 169-185 - [c46]Tadayoshi Kohno, John Kelsey, Bruce Schneier:
Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211 - [c45]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Niels Ferguson:
Comments on Twofish as an AES Candidate. AES Candidate Conference 2000: 355-356 - [c44]John Kelsey, Tadayoshi Kohno, Bruce Schneier:
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93 - [c43]Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David A. Wagner, Doug Whiting:
Improved Cryptanalysis of Rijndael. FSE 2000: 213-230 - [c42]Jonathan Katz, Bruce Schneier:
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. USENIX Security Symposium 2000 - [e1]Jean-Jacques Quisquater, Bruce Schneier:
Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings. Lecture Notes in Computer Science 1820, Springer 2000, ISBN 3-540-67923-5 [contents]
1990 – 1999
- 1999
- [j12]Bruce Schneier:
The Uses and Abuses of Biometrics. Commun. ACM 42(8): 136 (1999) - [j11]Bruce Schneier:
The Trojan Horse Race. Commun. ACM 42(9): 128 (1999) - [j10]Bruce Schneier:
Risks of Relying on Cryptography. Commun. ACM 42(10): 144 (1999) - [j9]Bruce Schneier:
Cryptography: The Importance of Not Being Different. Computer 32(3): 108-109 (1999) - [j8]John Kelsey, Bruce Schneier:
The Street Performer Protocol and Digital Copyrights. First Monday 4(6) (1999) - [j7]Bruce Schneier, John Kelsey:
Secure Audit Logs to Support Computer Forensics. ACM Trans. Inf. Syst. Secur. 2(2): 159-176 (1999) - [c41]Bruce Schneier, Mudge, David A. Wagner:
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). CQRE 1999: 192-203 - [c40]John Kelsey, Bruce Schneier, David A. Wagner:
Mod n Cryptanalysis, with Applications Against RC5P and M6. FSE 1999: 139-155 - [c39]Chris Hall, Ian Goldberg, Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems. ICICS 1999: 2-12 - [c38]John Kelsey, Bruce Schneier:
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. Recent Advances in Intrusion Detection 1999 - [c37]John Kelsey, Bruce Schneier, Niels Ferguson:
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. Selected Areas in Cryptography 1999: 13-33 - [c36]John Kelsey, Bruce Schneier:
Key-Schedule Cryptanalysis of DEAL. Selected Areas in Cryptography 1999: 118-134 - [c35]John Kelsey, Bruce Schneier:
Authenticating Secure Tokens Using Slow Memory Access. Smartcard 1999 - 1998
- [j6]Bruce Schneier:
Cryptographic Design Vulnerabilities. Computer 31(9): 29-33 (1998) - [j5]Bruce Schneier:
Security pitfalls in cryptographic design. Inf. Manag. Comput. Secur. 6(3): 133-137 (1998) - [c34]Bruce Schneier, James Riordan:
A Certified E-Mail Protocol. ACSAC 1998: 347-352 - [c33]John Kelsey, Bruce Schneier:
Secure Authentication with Multiple Parallel Keys. CARDIS 1998: 150-156 - [c32]Bruce Schneier, Doug Whiting:
Twofish on Smart Cards. CARDIS 1998: 265-276 - [c31]Bruce Schneier, Mudge:
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). CCS 1998: 132-141 - [c30]Chris Hall, David A. Wagner, John Kelsey, Bruce Schneier:
Building PRFs from PRPs. CRYPTO 1998: 370-389 - [c29]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. ESORICS 1998: 97-110 - [c28]Chris Hall, John Kelsey, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Financial Cryptography 1998: 309-310 - [c27]Don Coppersmith, David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of TWOPRIME. FSE 1998: 32-48 - [c26]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators. FSE 1998: 168-188 - [c25]James Riordan, Bruce Schneier:
Environmental Key Generation Towards Clueless Agents. Mobile Agents and Security 1998: 15-24 - [c24]Chris Slater, O. Sami Saydjari, Bruce Schneier, Jim Wallner:
Toward a Secure System Engineering Methodolgy. Workshop on New Security Paradigms 1998: 2-10 - [c23]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Chris Hall:
On the Twofish Key Schedule. Selected Areas in Cryptography 1998: 27-42 - [c22]David A. Wagner, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier:
Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305 - [c21]Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338 - [c20]Bruce Schneier, John Kelsey:
Cryptographic Support for Secure Logs on Untrusted Machines. USENIX Security Symposium 1998 - [c19]John Kelsey, Bruce Schneier:
Electronic Commerce and the Street Performer. USENIX Workshop on Electronic Commerce 1998 - 1997
- [j4]Bruce Schneier:
Cryptography, Security, and the Future. Commun. ACM 40(1): 138 (1997) - [j3]Bruce Schneier, John Kelsey:
Remote auditing of software outputs using a trusted coprocessor. Future Gener. Comput. Syst. 13(1): 9-18 (1997) - [j2]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier:
The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web J. 2: 241-257 (1997) - [c18]Bruce Schneier, Chris Hall:
An Improved E-Mail Security Protocol. ACSAC 1997: 227- - [c17]Chris Hall, Bruce Schneier:
Remote Electronic Gambling. ACSAC 1997: 232-238 - [c16]John Kelsey, Bruce Schneier:
Conditional Purchase Orders. CCS 1997: 117-124 - [c15]David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of the Cellular Encryption Algorithm. CRYPTO 1997: 526-537 - [c14]Bruce Schneier, Doug Whiting:
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. FSE 1997: 242-259 - [c13]John Kelsey, Bruce Schneier, David A. Wagner:
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. ICICS 1997: 233-246 - [c12]John Kelsey, Bruce Schneier, Chris Hall, David A. Wagner:
Secure Applications of Low-Entropy Keys. ISW 1997: 121-134 - [c11]John Kelsey, Bruce Schneier, David A. Wagner:
Protocol Interactions and the Chosen Protocol Attack. Security Protocols Workshop 1997: 91-104 - 1996
- [b2]Bruce Schneier:
Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C. Informationssicherheit, Addison-Wesley 1996, ISBN 978-3-89319-854-2, pp. I-XXII, 1-844 - [b1]Bruce Schneier:
Applied cryptography - protocols, algorithms, and source code in C, 2nd Edition. Wiley 1996, ISBN 978-0-471-11709-4, pp. I-XXIII, 1-758 - [j1]Michael F. Jones, Bruce Schneier:
Securing the World Wide Web: Smart Tokens and Their Implementation. World Wide Web J. 1(1) (1996) - [c10]John Kelsey, Bruce Schneier, Chris Hall:
An Authenticated Camera. ACSAC 1996: 24-30 - [c9]Bruce Schneier, John Kelsey:
Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. CARDIS 1996 - [c8]John Kelsey, Bruce Schneier, David A. Wagner:
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. CRYPTO 1996: 237-251 - [c7]Bruce Schneier, John Kelsey, Jay Walker:
Distributed Proctoring. ESORICS 1996: 172-182 - [c6]Bruce Schneier, John Kelsey:
Unbalanced Feistel Networks and Block Cipher Design. FSE 1996: 121-144 - [c5]Bruce Schneier, John Kelsey:
Automatic Event-Stream Notarization Using Digital Signatures. Security Protocols Workshop 1996: 155-169 - 1995
- [c4]Michael F. Jones, Bruce Schneier:
Securing the World Wide Web: Smart Tokens and Their Implementation. WWW (Fall) 1995: 397-409 - 1994
- [c3]Matt Blaze, Bruce Schneier:
The MacGuffin Block Cipher Algorithm. FSE 1994: 97-110 - [c2]Bruce Schneier:
Designing encryption algorithms for real people. NSPW 1994: 98-101 - 1993
- [c1]Bruce Schneier:
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). FSE 1993: 191-204
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint