NIST logo

Publications Portal

You searched on:
Author: john kelsey
Sorted by: date

Displaying records 1 to 10 of 15 records.
Resort by: Date / Title


1. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7896
Published: 11/15/2012
Authors: Shu-jen H Chang, Ray A Perlner, William Edward Burr, Meltem Sonmez Turan, John M Kelsey, Souradyuti Paul, Lawrence E Bassham
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms specified in the Federal Information Processing St ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912724

2. A Keyed Sponge Construction with Pseudorandomness in the Standard Model
Published: 3/22/2012
Authors: Dong H. Chang, Morris J Dworkin, Seokhie Hong, John M Kelsey, Mridul Nandi
Abstract: The sponge construction, designed by Bertoni, Daemen, Peeters, and Asscheis, is the framework for hash functions such as Keccak, PHOTON, Quark, and spongent. The designers give a keyed sponge construction by prepending the message with key and prove ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910823

3. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7764
Published: 2/23/2011
Authors: Meltem Sonmez Turan, Ray A Perlner, Lawrence E Bassham, William Edward Burr, Dong H. Chang, Shu-jen H Chang, Morris J Dworkin, John M Kelsey, Souradyuti Paul, Rene C Peralta
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information Pro ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907913

4. On the privacy threats of electronic poll books
Published: 10/4/2010
Authors: Stefan Popoveniuc, John M Kelsey
Abstract: Electronic poll books make the process of verifying that a voter is authorized to vote and issuing her a ballot faster and more convenient. However, they also introduce a privacy risk: if both the electronic poll book and voting machine or optical s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906172

5. Performance Requirements for End-to-End Verifiable Elections
Published: 8/9/2010
Authors: Stefan Popoveniuc, John M Kelsey, Andrew Richard Regenscheid, Poorvi Vora
Abstract: The term end-to-end verifiability has been used over the past several years to describe multiple voting system proposals. The term has, however, never been formally defined. As a result, its meaning tends to change from voting system to voting syst ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905908

6. On Hash Functions Using Checksums
Published: 4/1/2010
Authors: Praveen Gauruvarum, John M Kelsey, L. Knudsen, S. Thomsen
Abstract: We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum fun ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902682

7. Attacking Paper-Based E2E Voting Systems
Published: 2/1/2010
Authors: John M Kelsey, Andrew Richard Regenscheid, Tal Moran, David Chaum
Abstract: In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three end-to-end voting systems: Punchscan, Pret-a-Voter, and Threeballot. We also demonstrate ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901421

8. Herding, Second Preimage, and Trojan Message Attacks Beyond Merkle-Damgaard
Published: 11/3/2009
Authors: Elena Andreeva, Charles Bouillaguet , Orr Dunkelman, John M Kelsey
Abstract: In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgaard construction. We extend the herding attack to concatenated hashes, and to certain hash functions that proces ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903353

9. Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7620
Published: 9/23/2009
Authors: Andrew Richard Regenscheid, Ray A Perlner, Shu-jen H Chang, John M Kelsey, Mridul Nandi, Souradyuti Paul
Abstract: The National Institute of Standards and Technology is in the process of selecting a new cryptographic hash algorithm through a public competition. The new hash algorithm will be referred to as SHA-3 and will complement the SHA-2 hash algorithms cu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903483

10. Linear-XOR and Additive Checksums Don t Protect Damgaard-Merkle Hashes from Generic Attacks
Published: 4/17/2008
Authors: John M Kelsey, Praveen Gauravaram
Abstract: We consider the security of Damgaard-Merkle variants which computer linear-XOR or additive checksums over message blocks, intermediate hash values, or both, and process these checksums in computing the final hash value.  We show that these Damga ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51344



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series