J
John Kelsey
Researcher at National Institute of Standards and Technology
Publications - 15
Citations - 687
John Kelsey is an academic researcher from National Institute of Standards and Technology. The author has contributed to research in topics: MD4 & Block cipher. The author has an hindex of 8, co-authored 15 publications receiving 656 citations. Previous affiliations of John Kelsey include Katholieke Universiteit Leuven.
Papers
More filters
Patent
Copy security for portable music players
TL;DR: In this article, a secure portable track (SPT) is stored as a musical track which can be bound to one or more players and can be restricted to a particular storage medium, restricting playback of the SPT to the specific players and ensuring that playback is only from the original storage medium.
Journal Article
Secure applications of low-entropy keys
TL;DR: The notion of key stretching is introduced, a mechanism to convert short s- bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is the same as the time required to tackle a s-bit key stretched by t bits.
Book ChapterDOI
Building PRFs from PRPs
TL;DR: A slower construction which preserves the security of the PRP and a faster construction which has less security are presented, one application of which is to build a wider block cipher given a block cipher as a building tool.
Book ChapterDOI
Second preimage attacks on dithered hash functions
Elena Andreeva,Charles Bouillaguet,Pierre-Alain Fouque,Jonathan J. Hoch,John Kelsey,Adi Shamir,Sébastien Zimmer +6 more
TL;DR: In this article, a generic long-message second preimage attack was proposed, based on combining the techniques in the second-preimage attacks of Dean [8] and Kelsey and Schneier [16] with the herding attack of Kohno [15].
Book ChapterDOI
Secure Applications of Low-Entropy Keys
TL;DR: In this paper, the authors introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit key space is the same as the time required to find a s bit key stretched by t bits.