×

zbMATH — the first resource for mathematics

Schneier, Bruce

Compute Distance To:
Author ID: schneier.bruce Recent zbMATH articles by "Schneier, Bruce"
Published as: Schneier, Bruce; Schneider, Bruce; Schneider, B.; Schneier, B.
Homepage: https://www.schneier.com/
External Links: Wikidata · GND · IdRef
Documents Indexed: 35 Publications since 1993, including 8 Books

Publications by Year

Citations contained in zbMATH Open

27 Publications have been cited 442 times in 414 Documents Cited by Year
Applied cryptography. Protocols, algorithms and source code in C. 2nd ed. Zbl 0853.94001
Schneier, Bruce
168
1996
Applied cryptography. (Angewandte Kryptographie. Protokolle, Algorithmen und Sourcecode in C. Übers. aus dem Amerikan.: Katja Karsunke u. Thomas Merz.) Zbl 0883.94001
Schneier, Bruce
37
1996
Second preimages on \(n\)-bit hash functions for much less than \(2^{n}\) work. Zbl 1137.94350
Kelsey, John; Schneier, Bruce
36
2005
Improved cryptanalysis of Rijndael. Zbl 0994.68631
Ferguson, Niels; Kelsey, John; Lucks, Stefan; Schneier, Bruce; Stay, Mike; Wagner, David; Whiting, Doug
34
2001
Amplified boomerang attacks against reduced-round MARS and Serpent. Zbl 0994.68635
Kelsey, John; Kohno, Tadayoshi; Schneier, Bruce
23
2001
Description of a new variable-length key, 64-bit block cipher (Blowfish). Zbl 0943.94523
Schneier, Bruce
21
1994
Applied cryptography. Protocols, algorithms, and source code in C. Zbl 0789.94001
Schneier, Bruce
20
1993
Unbalanced Feistel networks and block cipher design. Zbl 1373.94930
Schneier, Bruce; Kelsey, John
15
1996
Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES. Zbl 1329.94066
Kelsey, John; Schneier, Bruce; Wagner, David
15
1996
Helix: fast encryption and authentication in a single cryptographic primitive. Zbl 1254.68115
Ferguson, Niels; Whiting, Doug; Schneier, Bruce; Kelsey, John; Lucks, Stefan; Kohno, Tadayoshi
9
2003
Building PRFs from PRPs. Zbl 0931.94045
Hall, Chris; Wagner, David; Kelsey, John; Schneider, Bruce
9
1998
Reaction attacks against several public-key cryptosystems. Zbl 0981.94027
Hall, Chris; Goldberg, Ian; Schneier, Bruce
7
1999
Protocol interactions and the chosen protocol attack. Zbl 0903.94041
Kelsey, John; Schneier, Bruce; Wagner, David
7
1998
Practical cryptography. Zbl 1314.94002
Ferguson, Niels; Schneier, Bruce
6
2003
On the twofish key schedule. Zbl 0929.94018
Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels
6
1999
Related-key cryptoanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Zbl 0888.94015
Kelsey, John; Schneier, Bruce; Wagner, David
5
1997
Cryptanalytic attacks on pseudorandom number generators. Zbl 1385.94048
Kelsey, John; Schneier, Bruce; Wagner, David; Hall, Chris
4
1998
\(\text{Mod }n\) cryptanalysis with applications against RC5P and M6. Zbl 0942.94021
Kelsey, John; Schneier, Bruce; Wagner, David
3
1999
Key-schedule cryptoanalysis of DEAL. Zbl 1004.94538
Kelsey, John; Schneier, Bruce
3
2000
A self-study course in block-cipher cryptanalysis. Zbl 1325.94002
Schneier, Bruce
3
2000
Secure applications of low-entropy keys. Zbl 0930.94021
Kelsey, John; Schneier, Bruce; Hall, Chris; Wagner, David
3
1998
Yarrow-160: Notes on the design and analysis of the Yarrow cryptographic pseudorandom number generator. Zbl 0992.94509
Kelsey, John; Schneier, Bruce; Ferguson, Niels
2
2000
Applied cryptography. Protocols, algorithms and source code in C. 20th anniversary edition. With a foreword by Whitfield Diffie. Reprint of the 1996 2nd edition. Zbl 1364.94009
Schneier, Bruce
2
2015
The MacGuffin block cipher algorithm. Zbl 0939.94552
Blaze, Matthew; Schneier, Bruce
1
1995
Fast software encryption: designing encryption algorithms for optimal software speed on the Intel Pentium processor. Zbl 1385.94070
Schneier, Bruce; Whiting, Doug
1
1997
E-mail security. Zbl 0872.94038
Schneier, Bruce
1
1995
Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10–12, 2000. Proceedings. Zbl 0958.00037
Schneier, Bruce (ed.)
1
2001
Applied cryptography. Protocols, algorithms and source code in C. 20th anniversary edition. With a foreword by Whitfield Diffie. Reprint of the 1996 2nd edition. Zbl 1364.94009
Schneier, Bruce
2
2015
Second preimages on \(n\)-bit hash functions for much less than \(2^{n}\) work. Zbl 1137.94350
Kelsey, John; Schneier, Bruce
36
2005
Helix: fast encryption and authentication in a single cryptographic primitive. Zbl 1254.68115
Ferguson, Niels; Whiting, Doug; Schneier, Bruce; Kelsey, John; Lucks, Stefan; Kohno, Tadayoshi
9
2003
Practical cryptography. Zbl 1314.94002
Ferguson, Niels; Schneier, Bruce
6
2003
Improved cryptanalysis of Rijndael. Zbl 0994.68631
Ferguson, Niels; Kelsey, John; Lucks, Stefan; Schneier, Bruce; Stay, Mike; Wagner, David; Whiting, Doug
34
2001
Amplified boomerang attacks against reduced-round MARS and Serpent. Zbl 0994.68635
Kelsey, John; Kohno, Tadayoshi; Schneier, Bruce
23
2001
Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10–12, 2000. Proceedings. Zbl 0958.00037
Schneier, Bruce
1
2001
Key-schedule cryptoanalysis of DEAL. Zbl 1004.94538
Kelsey, John; Schneier, Bruce
3
2000
A self-study course in block-cipher cryptanalysis. Zbl 1325.94002
Schneier, Bruce
3
2000
Yarrow-160: Notes on the design and analysis of the Yarrow cryptographic pseudorandom number generator. Zbl 0992.94509
Kelsey, John; Schneier, Bruce; Ferguson, Niels
2
2000
Reaction attacks against several public-key cryptosystems. Zbl 0981.94027
Hall, Chris; Goldberg, Ian; Schneier, Bruce
7
1999
On the twofish key schedule. Zbl 0929.94018
Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels
6
1999
\(\text{Mod }n\) cryptanalysis with applications against RC5P and M6. Zbl 0942.94021
Kelsey, John; Schneier, Bruce; Wagner, David
3
1999
Building PRFs from PRPs. Zbl 0931.94045
Hall, Chris; Wagner, David; Kelsey, John; Schneider, Bruce
9
1998
Protocol interactions and the chosen protocol attack. Zbl 0903.94041
Kelsey, John; Schneier, Bruce; Wagner, David
7
1998
Cryptanalytic attacks on pseudorandom number generators. Zbl 1385.94048
Kelsey, John; Schneier, Bruce; Wagner, David; Hall, Chris
4
1998
Secure applications of low-entropy keys. Zbl 0930.94021
Kelsey, John; Schneier, Bruce; Hall, Chris; Wagner, David
3
1998
Related-key cryptoanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Zbl 0888.94015
Kelsey, John; Schneier, Bruce; Wagner, David
5
1997
Fast software encryption: designing encryption algorithms for optimal software speed on the Intel Pentium processor. Zbl 1385.94070
Schneier, Bruce; Whiting, Doug
1
1997
Applied cryptography. Protocols, algorithms and source code in C. 2nd ed. Zbl 0853.94001
Schneier, Bruce
168
1996
Applied cryptography. (Angewandte Kryptographie. Protokolle, Algorithmen und Sourcecode in C. Übers. aus dem Amerikan.: Katja Karsunke u. Thomas Merz.) Zbl 0883.94001
Schneier, Bruce
37
1996
Unbalanced Feistel networks and block cipher design. Zbl 1373.94930
Schneier, Bruce; Kelsey, John
15
1996
Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES. Zbl 1329.94066
Kelsey, John; Schneier, Bruce; Wagner, David
15
1996
The MacGuffin block cipher algorithm. Zbl 0939.94552
Blaze, Matthew; Schneier, Bruce
1
1995
E-mail security. Zbl 0872.94038
Schneier, Bruce
1
1995
Description of a new variable-length key, 64-bit block cipher (Blowfish). Zbl 0943.94523
Schneier, Bruce
21
1994
Applied cryptography. Protocols, algorithms, and source code in C. Zbl 0789.94001
Schneier, Bruce
20
1993
all top 5

Cited by 801 Authors

14 Dunkelman, Orr
12 Keller, Nathan
9 Li, Shujun
9 Liao, Xiaofeng
9 Shamir, Adi
7 Knudsen, Lars Ramkilde
7 Preneel, Bart
6 Chen, Guanrong
5 Álvarez, Gonzalo A.
5 Lucks, Stefan
5 Sasaki, Yu
5 Wong, Kwokwo
4 Akhavan, Amir
4 Akhshani, Afshin
4 Andreeva, Elena Anatol’evna
4 Behnia, Sohrab
4 Dinur, Itai
4 Gorski, Michael
4 Leander, Gregor
4 Lu, Jiqiang
4 Mennink, Bart
4 Mou, Xuanqin
4 Nikolić, Ivica
4 Peyrin, Thomas
4 Pudovkina, Marina Aleksandrovna
4 Wang, Meiqin
4 Xiao, Di
3 Bogdanov, Andrey
3 Chang, Chin-Chen
3 Gauravaram, Praveen
3 Guo, Ying
3 Hwang, Min-Shiang
3 Jakimoski, Goce
3 Ji, Zhen
3 Kelsey, John
3 Lai, Xuejia
3 Lee, Moonho
3 Leurent, Gaëtan
3 Li, Chengqing
3 Nandi, Mridul
3 Patarin, Jacques
3 Phan, Raphael Chung-Wei
3 Rechberger, Christian
3 Roy, Arnab
3 Seurin, Yannick
3 Shi, Jinjing
3 Sun, Ling
3 Thomsen, Søren S.
3 Wang, Lei
3 Wang, Xingyuan
3 Xiang, Tao
3 Zhang, Jihong
3 Zhang, Zhanjun
2 Ahmad, Jawad
2 Aoki, Kazumaro
2 Bagheri, Nasour
2 Bar-On, Achiya
2 Baumslag, Gilbert
2 Bérczes, Attila
2 Biham, Eli
2 Biryukov, Alex
2 Bishoi, Susil Kumar
2 Borghoff, Julia
2 Cai, Yuanlong
2 Cao, Zhengjun
2 Chen, Huaifeng
2 Chew, Guanhan
2 Choy, Jiali
2 Clapp, Craig S. K.
2 Climent, Joan-Josep
2 Cogliati, Benoît
2 Dehnavi, Seyed Mojtaba
2 Deng, Shaojiang
2 Dobraunig, Christoph
2 Dubrova, Elena
2 Ewe, Hong-Tat
2 Focardi, Riccardo
2 Fomichëv, V. M.
2 Fouque, Pierre-Alain
2 Gilboa, Shoni
2 Golić, Jovan Dj.
2 Grassi, Lorenzo
2 Gueron, Shay
2 Guo, Jian
2 Halang, Wolfgang A.
2 Hsieh, Tsu-Miin
2 Hu, Gang
2 Huang, Jialin
2 Isobe, Takanori
2 Jeng, Albert B.
2 Jia, Keting
2 Jin, Chenhui
2 Kara, Orhun
2 Katos, Vasilios
2 Khan, Muhammad Khurram
2 Khoo, Khoongming
2 Kocarev, Ljupco
2 Koreneva, A. M.
2 Koukouvinos, Christos
2 Lai, Wei-Shen
...and 701 more Authors
all top 5

Cited in 98 Serials

22 Designs, Codes and Cryptography
21 Physics Letters. A
21 Journal of Cryptology
15 Information Processing Letters
12 Applied Mathematics and Computation
12 Information Sciences
12 Communications in Nonlinear Science and Numerical Simulation
11 Chaos, Solitons and Fractals
11 Journal of Discrete Mathematical Sciences & Cryptography
9 Prikladnaya Diskretnaya Matematika
8 Theoretical Computer Science
7 Cryptography and Communications
6 Discrete Applied Mathematics
6 International Journal of Theoretical Physics
6 Journal of Computer and System Sciences
6 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
6 Nonlinear Dynamics
6 Wuhan University Journal of Natural Sciences (WUJNS)
5 Information and Computation
4 Cryptologia
4 Journal of Computer Science and Technology
4 Science in China. Series F
4 Matematicheskie Voprosy Kriptografii
3 Mathematical Problems in Engineering
3 Quantum Information Processing
3 International Journal of Quantum Information
2 Computers & Mathematics with Applications
2 Computer Physics Communications
2 Problems of Information Transmission
2 Networks
2 Journal of Information & Optimization Sciences
2 New Generation Computing
2 Algorithmica
2 Journal of Automated Reasoning
2 Mathematical and Computer Modelling
2 Automation and Remote Control
2 International Journal of Computer Mathematics
2 Pattern Recognition
2 Applicable Algebra in Engineering, Communication and Computing
2 Cybernetics and Systems Analysis
2 Journal of Mathematical Sciences (New York)
2 Finite Fields and their Applications
2 Chaos
2 Lobachevskii Journal of Mathematics
2 Electronic Commerce Research
2 International Journal of Wavelets, Multiresolution and Information Processing
2 Journal of Zhejiang University. Science A
2 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
2 Groups, Complexity, Cryptology
2 Diskretnyĭ Analiz i Issledovanie Operatsiĭ
1 International Journal of Modern Physics B
1 Discrete Mathematics
1 Journal of the Franklin Institute
1 Periodica Mathematica Hungarica
1 Rocky Mountain Journal of Mathematics
1 Duke Mathematical Journal
1 Journal of Statistical Planning and Inference
1 Kybernetes
1 Mathematica Slovaca
1 Nonlinear Analysis. Theory, Methods & Applications. Series A: Theory and Methods
1 Cybernetics and Systems
1 Acta Applicandae Mathematicae
1 Physica D
1 Journal of Complexity
1 Journal of Parallel and Distributed Computing
1 Signal Processing
1 Multidimensional Systems and Signal Processing
1 MSCS. Mathematical Structures in Computer Science
1 Concurrency: Practice and Experience
1 Discrete Mathematics and Applications
1 Communications in Statistics. Simulation and Computation
1 European Journal of Operational Research
1 Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences
1 Tatra Mountains Mathematical Publications
1 Formal Methods in System Design
1 Journal of Logic, Language and Information
1 Applied Mathematics. Series B (English Edition)
1 Algebra Colloquium
1 Complexity
1 ACM Transactions on Modeling and Computer Simulation
1 Science in China. Series E
1 European Journal of Control
1 Miscelánea Matemática
1 The Journal of Logic and Algebraic Programming
1 Journal of Systems Science and Complexity
1 Journal of Intelligent and Fuzzy Systems
1 Journal of Discrete Algorithms
1 Journal of Shanghai Jiaotong University (Science)
1 Journal of the Korean Statistical Society
1 Applications and Applied Mathematics
1 Journal of Mathematical Cryptology
1 Advances in Mathematics of Communications
1
1 Science China. Information Sciences
1 Arabian Journal for Science and Engineering
1 Statistics and Computing
1 Frontiers of Computer Science
1 Open Mathematics

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.