Obserwuj
Chris Hall
Chris Hall
Zweryfikowany adres z uwo.ca - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Twofish: A 128-bit block cipher
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
NIST AES Proposal 15 (1), 23-91, 1998
7411998
Cryptanalytic attacks on pseudorandom number generators
J Kelsey, B Schneier, D Wagner, C Hall
Fast Software Encryption: 5th International Workshop, FSE’98 Paris, France …, 1998
3791998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Computer Security—ESORICS 98: 5th European Symposium on Research in …, 1998
3591998
Side channel cryptanalysis of product ciphers
J Kelsey, B Schneier, D Wagner, C Hall
Journal of Computer Security 8 (2-3), 141-158, 2000
2612000
Protecting secret keys with personal entropy
C Ellison, C Hall, R Milbert, B Schneier
Future Generation Computer Systems 16 (4), 311-318, 2000
1532000
Secure applications of low-entropy keys
J Kelsey, B Schneier, C Hall, D Wagner
Information Security: First International Workshop, ISW'97 Tatsunokuchi …, 2005
1512005
Social epidemiology and complex system dynamic modelling as applied to health behaviour and drug use research
S Galea, C Hall, GA Kaplan
International Journal of Drug Policy 20 (3), 209-216, 2009
1422009
Performance comparison of the AES submissions
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
Second AES Candidate Conference, 15-34, 1999
1281999
Reaction attacks against several public-key cryptosystem
C Hall, I Goldberg, B Schneier
Information and Communication Security: Second International Conference …, 1999
1251999
Building prfs from prps
C Hall, D Wagner, J Kelsey, B Schneier
CRYPTO 98, 370-389, 1998
1041998
Big symplectic or orthogonal monodromy modulo
C Hall
682008
An open-image theorem for a general class of abelian varieties
C Hall
Bulletin of the London Mathematical Society 43 (4), 703-711, 2011
612011
Expander graphs, gonality, and variation of Galois representations
JS Ellenberg, C Hall, E Kowalski
582012
The Twofish team’s final comments on AES Selection
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson, T Kohno, ...
AES round 2 (1), 1-13, 2000
582000
Uniform results for Serre's theorem for elliptic curves
AC Cojocaru, C Hall
International Mathematics Research Notices 2005 (50), 3065-3080, 2005
562005
Ramanujan coverings of graphs
C Hall, D Puder, WF Sawin
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
412016
L-functions of twisted Legendre curves
C Hall
Journal of Number Theory 119 (1), 128-147, 2006
412006
Remote electronic gambling
C Hall, B Schneier
Proceedings 13th annual computer security applications conference, 232-238, 1997
411997
On the twofish key schedule
B Schneier, J Kelsey, D Whiting, D Wagner, C Hall, N Ferguson
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 2002
322002
Bounded gaps between primes in number fields and function fields
A Castillo, C Hall, R Lemke Oliver, P Pollack, L Thompson
Proceedings of the American Mathematical Society 143 (7), 2841-2856, 2015
292015
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20