| Improved cryptanalysis of Rijndael N Ferguson, J Kelsey, S Lucks, B Schneier, M Stay, D Wagner, D Whiting International Workshop on Fast Software Encryption, 213-230, 2000 | 541 | 2000 |
| Secure audit logs to support computer forensics B Schneier, J Kelsey ACM Transactions on Information and System Security (TISSEC) 2 (2), 159-176, 1999 | 513 | 1999 |
| Twofish: A 128-bit block cipher B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson NIST AES Proposal 15 (1), 23-91, 1998 | 454 | 1998 |
| Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work J Kelsey, B Schneier Annual International Conference on the Theory and Applications of …, 2005 | 434 | 2005 |
| Recommendation for random number generation using deterministic random bit generators (revised) EB Barker, JM Kelsey US Department of Commerce, Technology Administration, National Institute of …, 2007 | 378 | 2007 |
| Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des J Kelsey, B Schneier, D Wagner Annual International Cryptology Conference, 237-251, 1996 | 365 | 1996 |
| Event auditing system B Schneier, JM Kelsey US Patent 5,978,475, 1999 | 345 | 1999 |
| Copy security for portable music players ST Ansell, AR Cherenson, ME Paley, SB Katz, JM Kelsey Jr, B Schneier US Patent 6,367,019, 2002 | 341 | 2002 |
| Cryptographic support for secure logs on untrusted machines. B Schneier, J Kelsey USENIX Security Symposium 98, 53-62, 1998 | 319 | 1998 |
| Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea J Kelsey, B Schneier, D Wagner International Conference on Information and Communications Security, 233-246, 1997 | 297 | 1997 |
| Side channel cryptanalysis of product ciphers J Kelsey, B Schneier, D Wagner, C Hall European Symposium on Research in Computer Security, 97-110, 1998 | 292 | 1998 |
| Unbalanced Feistel networks and block cipher design B Schneier, J Kelsey International Workshop on Fast Software Encryption, 121-144, 1996 | 282 | 1996 |
| Cryptanalytic attacks on pseudorandom number generators J Kelsey, B Schneier, D Wagner, C Hall International Workshop on Fast Software Encryption, 168-188, 1998 | 278 | 1998 |
| Digital signature with auditing bits B Schneier, J Kelsey US Patent 5,956,404, 1999 | 273 | 1999 |
| Herding hash functions and the Nostradamus attack J Kelsey, T Kohno Annual International Conference on the Theory and Applications of …, 2006 | 251 | 2006 |
| The Twofish encryption algorithm: a 128-bit block cipher B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson John Wiley & Sons, Inc., 1999 | 243 | 1999 |
| Side channel cryptanalysis of product ciphers J Kelsey, B Schneier, D Wagner, C Hall Journal of Computer Security 8 (2-3), 141-158, 2000 | 228 | 2000 |
| Amplified boomerang attacks against reduced-round MARS and Serpent J Kelsey, T Kohno, B Schneier International Workshop on Fast Software Encryption, 75-93, 2000 | 212 | 2000 |
| Protocol interactions and the chosen protocol attack J Kelsey, B Schneier, D Wagner International Workshop on Security Protocols, 91-104, 1997 | 192 | 1997 |
| Helix: Fast encryption and authentication in a single cryptographic primitive N Ferguson, D Whiting, B Schneier, J Kelsey, S Lucks, T Kohno International workshop on fast software encryption, 330-346, 2003 | 191 | 2003 |