NIST logo

Publications Portal

You searched on: Author: john kelsey

Displaying records 11 to 20 of 22 records.
Resort by: Date / Title


11. Performance Requirements for End-to-End Verifiable Elections
Published: 8/9/2010
Authors: Stefan Popoveniuc, John M Kelsey, Andrew Richard Regenscheid, Poorvi Vora
Abstract: The term end-to-end verifiability has been used over the past several years to describe multiple voting system proposals. The term has, however, never been formally defined. As a result, its meaning tends to change from voting system to voting syst ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905908

12. On Hash Functions Using Checksums
Published: 4/1/2010
Authors: Praveen Gauruvarum, John M Kelsey, L. Knudsen, S. Thomsen
Abstract: We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum fun ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902682

13. Attacking Paper-Based E2E Voting Systems
Published: 2/1/2010
Authors: John M Kelsey, Andrew Richard Regenscheid, Tal Moran, David Chaum
Abstract: In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three end-to-end voting systems: Punchscan, Pret-a-Voter, and Threeballot. We also demonstrate ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901421

14. Herding, Second Preimage, and Trojan Message Attacks Beyond Merkle-Damgaard
Published: 11/3/2009
Authors: Elena Andreeva, Charles Bouillaguet , Orr Dunkelman, John M Kelsey
Abstract: In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgaard construction. We extend the herding attack to concatenated hashes, and to certain hash functions that proces ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903353

15. Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7620
Published: 9/23/2009
Authors: Andrew Richard Regenscheid, Ray A Perlner, Shu-jen H Chang, John M Kelsey, Mridul Nandi, Souradyuti Paul
Abstract: The National Institute of Standards and Technology is in the process of selecting a new cryptographic hash algorithm through a public competition. The new hash algorithm will be referred to as SHA-3 and will complement the SHA-2 hash algorithms cu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903483

16. Linear-XOR and Additive Checksums Don t Protect Damgaard-Merkle Hashes from Generic Attacks
Published: 4/17/2008
Authors: Praveen Gauravaram, John M Kelsey
Abstract: We consider the security of Damgaard-Merkle variants which computer linear-XOR or additive checksums over message blocks, intermediate hash values, or both, and process these checksums in computing the final hash value.  We show that these Damgaard-M ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51344

17. Second Preimage Attacks on Dithered Hash Functions
Published: 4/17/2008
Authors: Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John M Kelsey, Adi Shamir, Sebastien Zimmer
Abstract: We develop a new generic long-message second preimage attack, based on combining the techniques in the second preimage attacks of Dean {Dean99} and Kelsey and Schneier {KS05} with the herding attack of Kelsey and Kohno {KK06}. We show that these gen ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152101

18. Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-90 Rev
Published: 3/14/2007
Authors: Elaine B Barker, John M Kelsey
Abstract: [Superseded by SP 800-90A (January 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910345] This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50814

19. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90
Published: 6/13/2006
Authors: Elaine B Barker, John M Kelsey
Abstract: [Superseded by SP 800-90 Revised (March 2007): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50814] This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918931

20. Herding Hash Functions and the Nostradamus Attack
Published: 5/28/2006
Authors: John M Kelsey, Tadayoshi Kohno
Abstract: In this paper, we develop a new attack on Damgaard-Merkle hash functions, called the herding attack, in which an attacker who can find many collisions on the hash function by brute force can first provide the hash of message, and later ``herd'' any g ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150629



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series