Остановите войну!
for scientists:
default search action
Bruce Schneier
- > Home > Persons > Bruce Schneier
Publications
- 2024
- [j83]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - 2023
- [i10]Stephen Farrell, Farzaneh Badii, Bruce Schneier, Steven M. Bellovin:
Reflections on Ten Years Past the Snowden Revelations. RFC 9446: 1-29 (2023) - 2021
- [j79]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [i9]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - 2020
- [j76]Karen Levy, Bruce Schneier:
Privacy threats in intimate relationships. J. Cybersecur. 6(1): tyaa006 (2020) - [i6]Karen Levy, Bruce Schneier:
Privacy threats in intimate relationships. CoRR abs/2006.03907 (2020) - 2015
- [j65]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j64]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [i4]Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. IACR Cryptol. ePrint Arch. 2015: 97 (2015) - 2010
- [b9]Niels Ferguson, Bruce Schneier, Tadayoshi Kohno:
Cryptography Engineering - Design Principles and Practical Applications. Wiley 2010, ISBN 978-0-470-47424-2, pp. I-XXIX, 1-353 - [j50]Theo Dimitrakos, Fabio Martinelli, Bruce Schneier:
Special issue on security and trust management for dynamic coalitions. Secur. Commun. Networks 3(6): 453-455 (2010) - 2008
- [c53]Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008 - 2005
- [j40]Ross J. Anderson, Bruce Schneier:
Guest Editors' Introduction: Economics of Information Security. IEEE Secur. Priv. 3(1): 12-13 (2005) - [c52]John Kelsey, Bruce Schneier:
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. EUROCRYPT 2005: 474-490 - [i2]Paul E. Hoffman, Bruce Schneier:
Attacks on Cryptographic Hashes in Internet Protocols. RFC 4270: 1-12 (2005) - 2004
- [i1]John Kelsey, Bruce Schneier:
Second Preimages on n-bit Hash Functions for Much Less than 2n Work. IACR Cryptol. ePrint Arch. 2004: 304 (2004) - 2003
- [b3]Niels Ferguson, Bruce Schneier:
Practical cryptography. Wiley 2003, ISBN 978-0-471-22357-3, pp. I-XX, 1-410 - [j28]David L. Dill, Bruce Schneier, Barbara Simons:
Voting and technology: who gets to count your vote? Commun. ACM 46(8): 29-31 (2003) - [c51]Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346 - 2002
- [c50]Kahil Jallad, Jonathan Katz, Bruce Schneier:
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. ISC 2002: 90-101 - 2001
- [j20]Stephan Somogyi, Bruce Schneier:
The perils of port 80. Commun. ACM 44(10): 168 (2001) - 2000
- [j18]Carl M. Ellison, Bruce Schneier:
Risks of PKI: Secure Email. Commun. ACM 43(1): 160 (2000) - [j17]Carl M. Ellison, Bruce Schneier:
Risks of PKI: E-Commerce. Commun. ACM 43(2): 152 (2000) - [j14]Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier:
Protecting secret keys with personal entropy. Future Gener. Comput. Syst. 16(4): 311-318 (2000) - [j13]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. J. Comput. Secur. 8(2/3): 141-158 (2000) - [c49]Niels Ferguson, Bruce Schneier, David A. Wagner:
Security Weaknesses in a Randomized Stream Cipher. ACISP 2000: 234-241 - [c48]Bruce Schneier, Doug Whiting:
A Performance Comparison of the Five AES Finalists. AES Candidate Conference 2000: 123-135 - [c47]John Kelsey, Bruce Schneier:
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. AES Candidate Conference 2000: 169-185 - [c46]Tadayoshi Kohno, John Kelsey, Bruce Schneier:
Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211 - [c45]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Niels Ferguson:
Comments on Twofish as an AES Candidate. AES Candidate Conference 2000: 355-356 - [c44]John Kelsey, Tadayoshi Kohno, Bruce Schneier:
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93 - [c43]Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David A. Wagner, Doug Whiting:
Improved Cryptanalysis of Rijndael. FSE 2000: 213-230 - [c42]Jonathan Katz, Bruce Schneier:
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. USENIX Security Symposium 2000 - [e1]Jean-Jacques Quisquater, Bruce Schneier:
Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings. Lecture Notes in Computer Science 1820, Springer 2000, ISBN 3-540-67923-5 [contents] - 1999
- [j8]John Kelsey, Bruce Schneier:
The Street Performer Protocol and Digital Copyrights. First Monday 4(6) (1999) - [j7]Bruce Schneier, John Kelsey:
Secure Audit Logs to Support Computer Forensics. ACM Trans. Inf. Syst. Secur. 2(2): 159-176 (1999) - [c41]Bruce Schneier, Mudge, David A. Wagner:
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). CQRE 1999: 192-203 - [c40]John Kelsey, Bruce Schneier, David A. Wagner:
Mod n Cryptanalysis, with Applications Against RC5P and M6. FSE 1999: 139-155 - [c39]Chris Hall, Ian Goldberg, Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems. ICICS 1999: 2-12 - [c38]John Kelsey, Bruce Schneier:
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. Recent Advances in Intrusion Detection 1999 - [c37]John Kelsey, Bruce Schneier, Niels Ferguson:
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. Selected Areas in Cryptography 1999: 13-33 - [c36]John Kelsey, Bruce Schneier:
Key-Schedule Cryptanalysis of DEAL. Selected Areas in Cryptography 1999: 118-134 - [c35]John Kelsey, Bruce Schneier:
Authenticating Secure Tokens Using Slow Memory Access. Smartcard 1999 - 1998
- [c34]Bruce Schneier, James Riordan:
A Certified E-Mail Protocol. ACSAC 1998: 347-352 - [c33]John Kelsey, Bruce Schneier:
Secure Authentication with Multiple Parallel Keys. CARDIS 1998: 150-156 - [c32]Bruce Schneier, Doug Whiting:
Twofish on Smart Cards. CARDIS 1998: 265-276 - [c31]Bruce Schneier, Mudge:
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). CCS 1998: 132-141 - [c30]Chris Hall, David A. Wagner, John Kelsey, Bruce Schneier:
Building PRFs from PRPs. CRYPTO 1998: 370-389 - [c29]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. ESORICS 1998: 97-110 - [c28]Chris Hall, John Kelsey, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Financial Cryptography 1998: 309-310 - [c27]Don Coppersmith, David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of TWOPRIME. FSE 1998: 32-48 - [c26]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators. FSE 1998: 168-188 - [c25]James Riordan, Bruce Schneier:
Environmental Key Generation Towards Clueless Agents. Mobile Agents and Security 1998: 15-24 - [c23]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Chris Hall:
On the Twofish Key Schedule. Selected Areas in Cryptography 1998: 27-42 - [c22]David A. Wagner, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier:
Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305 - [c21]Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338 - [c20]Bruce Schneier, John Kelsey:
Cryptographic Support for Secure Logs on Untrusted Machines. USENIX Security Symposium 1998 - [c19]John Kelsey, Bruce Schneier:
Electronic Commerce and the Street Performer. USENIX Workshop on Electronic Commerce 1998 - 1997
- [j3]Bruce Schneier, John Kelsey:
Remote auditing of software outputs using a trusted coprocessor. Future Gener. Comput. Syst. 13(1): 9-18 (1997) - [j2]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier:
The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web J. 2: 241-257 (1997) - [c18]Bruce Schneier, Chris Hall:
An Improved E-Mail Security Protocol. ACSAC 1997: 227- - [c17]Chris Hall, Bruce Schneier:
Remote Electronic Gambling. ACSAC 1997: 232-238 - [c16]John Kelsey, Bruce Schneier:
Conditional Purchase Orders. CCS 1997: 117-124 - [c15]David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of the Cellular Encryption Algorithm. CRYPTO 1997: 526-537 - [c14]Bruce Schneier, Doug Whiting:
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. FSE 1997: 242-259 - [c13]John Kelsey, Bruce Schneier, David A. Wagner:
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. ICICS 1997: 233-246 - [c12]John Kelsey, Bruce Schneier, Chris Hall, David A. Wagner:
Secure Applications of Low-Entropy Keys. ISW 1997: 121-134 - [c11]John Kelsey, Bruce Schneier, David A. Wagner:
Protocol Interactions and the Chosen Protocol Attack. Security Protocols Workshop 1997: 91-104 - 1996
- [c10]John Kelsey, Bruce Schneier, Chris Hall:
An Authenticated Camera. ACSAC 1996: 24-30 - [c9]Bruce Schneier, John Kelsey:
Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. CARDIS 1996 - [c8]John Kelsey, Bruce Schneier, David A. Wagner:
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. CRYPTO 1996: 237-251 - [c7]Bruce Schneier, John Kelsey, Jay Walker:
Distributed Proctoring. ESORICS 1996: 172-182 - [c6]Bruce Schneier, John Kelsey:
Unbalanced Feistel Networks and Block Cipher Design. FSE 1996: 121-144 - [c5]Bruce Schneier, John Kelsey:
Automatic Event-Stream Notarization Using Digital Signatures. Security Protocols Workshop 1996: 155-169 - 1994
- [c3]Matt Blaze, Bruce Schneier:
The MacGuffin Block Cipher Algorithm. FSE 1994: 97-110
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint