BibTeX records: Chris Hall

download as .bib file

@article{DBLP:journals/access/HallD23,
  author       = {Chris Hall and
                  Ivan B. Djordjevic},
  title        = {Discrete Time Signal Localization Accuracy in Gaussian Noise at Low
                  Signal to Noise Ratios},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {109595--109602},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3322207},
  doi          = {10.1109/ACCESS.2023.3322207},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HallD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocch/MeineckeHJ22,
  author       = {Christofer Meinecke and
                  Chris Hall and
                  Stefan J{\"{a}}nicke},
  title        = {Towards Enhancing Virtual Museums by Contextualizing Art through Interactive
                  Visualizations},
  journal      = {{ACM} Journal on Computing and Cultural Heritage},
  volume       = {15},
  number       = {4},
  pages        = {1--26},
  year         = {2022},
  url          = {https://doi.org/10.1145/3527619},
  doi          = {10.1145/3527619},
  timestamp    = {Fri, 12 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocch/MeineckeHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmi/RubenPBSPCMHHUK22,
  author       = {Gary Ruben and
                  Isaac Pinar and
                  Jeremy M. C. Brown and
                  Florian Schaff and
                  James A. Pollock and
                  Kelly J. Crossley and
                  Anton Maksimenko and
                  Chris Hall and
                  Daniel Hausermann and
                  Kentaro Uesugi and
                  Marcus J. Kitchen},
  title        = {Full Field X-Ray Scatter Tomography},
  journal      = {{IEEE} Trans. Medical Imaging},
  volume       = {41},
  number       = {8},
  pages        = {2170--2179},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMI.2022.3157954},
  doi          = {10.1109/TMI.2022.3157954},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmi/RubenPBSPCMHHUK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blackseecom/HallD21,
  author       = {Chris Hall and
                  Ivan B. Djordjevic},
  title        = {Mixer Imbalance Correction in Wireless {OFDM} Systems},
  booktitle    = {2021 {IEEE} International Black Sea Conference on Communications and
                  Networking, BlackSeaCom 2021, Bucharest, Romania, May 24-28, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BlackSeaCom52164.2021.9527894},
  doi          = {10.1109/BLACKSEACOM52164.2021.9527894},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blackseecom/HallD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itag/BeynonBFHHPRMAA16,
  author       = {Meurig Beynon and
                  Russell Boyatt and
                  Jonathan Foss and
                  Chris Hall and
                  Elizabeth Hudnott and
                  Nick Pope and
                  Steve Russ and
                  Hamish Macleod and
                  Dimitris Alimisis and
                  Rene Alimisi and
                  Emmanouil Zoulias and
                  Ilkka Jormanainen and
                  Tapani Toivonen and
                  Piet Kommers and
                  Peter Tomcs{\'{a}}nyi and
                  Michal Winczer},
  title        = {Playing Games with Observation, Dependency, and Agency in a New Environment
                  for Making Construals},
  booktitle    = {2016 International Conference on Interactive Technologies and Games,
                  iTAG 2016, Notthingham, United Kingdom, October 26-27, 2016},
  pages        = {21--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/iTAG.2016.11},
  doi          = {10.1109/ITAG.2016.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itag/BeynonBFHHPRMAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/HallPS16,
  author       = {Chris Hall and
                  Doron Puder and
                  William F. Sawin},
  editor       = {Daniel Wichs and
                  Yishay Mansour},
  title        = {Ramanujan coverings of graphs},
  booktitle    = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  pages        = {533--541},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897518.2897574},
  doi          = {10.1145/2897518.2897574},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/HallPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itag/BeynonFHRHBKSJS15,
  author       = {Meurig Beynon and
                  Jonathan Foss and
                  Elizabeth Hudnott and
                  Steve Russ and
                  Chris Hall and
                  Russell Boyatt and
                  Emma King and
                  Erkki Sutinen and
                  Ilkka Jormanainen and
                  Carolina Islas Sedano and
                  Andr{\'{e}}s Moreno and
                  Hamish Macleod and
                  Jen Ross and
                  Piet Kommers and
                  Dimitris Alimisis and
                  Emmanouil Zoulias and
                  Rene Alimisi and
                  Peter Tomcs{\'{a}}nyi and
                  Michal Winczer},
  title        = {Making Construals as a New Digital Skill: Dissolving the Program -
                  and the Programmer - Interface},
  booktitle    = {2015 International Conference on Interactive Technologies and Games,
                  Nottingham, United Kingdom, October 22-23, 2015},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/iTAG.2015.10},
  doi          = {10.1109/ITAG.2015.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itag/BeynonFHRHBKSJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HallYZSOMCBA14,
  author       = {Chris Hall and
                  Dongting Yu and
                  Zhi{-}Li Zhang and
                  Jonathan Stout and
                  Andrew M. Odlyzko and
                  Andrew W. Moore and
                  L. Jean Camp and
                  Kevin Benton and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Collaborating with the Enemy on Network Management},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {154--162},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_15},
  doi          = {10.1007/978-3-319-12400-1\_15},
  timestamp    = {Mon, 05 Feb 2024 20:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/HallYZSOMCBA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonH14,
  author       = {Ross J. Anderson and
                  Chris Hall},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Collaborating with the Enemy on Network Management (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {163--171},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_16},
  doi          = {10.1007/978-3-319-12400-1\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YuMHA13,
  author       = {Dongting Yu and
                  Andrew W. Moore and
                  Chris Hall and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Authentication for Resilience: The Case of {SDN}},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {39--44},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_6},
  doi          = {10.1007/978-3-642-41717-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YuMHA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Hall12,
  author       = {Chris Hall},
  title        = {Security of the internet and the known unknowns},
  journal      = {Commun. {ACM}},
  volume       = {55},
  number       = {6},
  pages        = {35--37},
  year         = {2012},
  url          = {https://doi.org/10.1145/2184319.2184332},
  doi          = {10.1145/2184319.2184332},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Hall12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/em/BaigH12,
  author       = {Salman Baig and
                  Chris Hall},
  title        = {Experimental Data for Goldfeld's Conjecture over Function Fields},
  journal      = {Exp. Math.},
  volume       = {21},
  number       = {4},
  pages        = {362--374},
  year         = {2012},
  url          = {https://doi.org/10.1080/10586458.2012.671638},
  doi          = {10.1080/10586458.2012.671638},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/em/BaigH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/HallACOT11,
  author       = {Chris Hall and
                  Ross J. Anderson and
                  Richard Clayton and
                  Evangelos Ouzounis and
                  Panagiotis Trimintzios},
  title        = {Resilience of the Internet Interconnection Ecosystem},
  booktitle    = {10th Annual Workshop on the Economics of Information Security, {WEIS}
                  2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011},
  year         = {2011},
  url          = {http://weis2011.econinfosec.org/papers/Resilience\%20of\%20the\%20Internet\%20Interconnection\%20Ecosystem.pdf},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/HallACOT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/HallACOT11a,
  author       = {Chris Hall and
                  Ross J. Anderson and
                  Richard Clayton and
                  Evangelos Ouzounis and
                  Panagiotis Trimintzios},
  editor       = {Bruce Schneier},
  title        = {Resilience of the Internet Interconnection Ecosystem},
  booktitle    = {Economics of Information Security and Privacy {III} [papers from the
                  Tenth Workshop on Economics and Information Security, {WEIS} 2011]},
  pages        = {119--148},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-1981-5\_6},
  doi          = {10.1007/978-1-4614-1981-5\_6},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/HallACOT11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/WastellWBHP09,
  author       = {David Wastell and
                  Susan White and
                  Karen Broadhurst and
                  Chris Hall and
                  Sue Peckover},
  editor       = {Susan Newell and
                  Edgar A. Whitley and
                  Nancy Pouloudi and
                  Jonathan Wareham and
                  Lars Mathiassen},
  title        = {The chiasmus of design: Paradoxical outcomes in the e-government reform
                  of {UK} children's services},
  booktitle    = {17th European Conference on Information Systems, {ECIS} 2009, Verona,
                  Italy, 2009},
  pages        = {134--145},
  year         = {2009},
  url          = {http://aisel.aisnet.org/ecis2009/397},
  timestamp    = {Mon, 05 Dec 2016 15:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/WastellWBHP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siggraph/RostBHSRMBS06,
  author       = {Randi J. Rost and
                  Lars Bishop and
                  Chris Hall and
                  Robert Simpson and
                  Daniel Rice and
                  Brian Murray and
                  Mark Barnes and
                  Timo Suoranta},
  editor       = {John W. Finnegan and
                  Dave Shreiner},
  title        = {OpenKODE: an open mobile media development environment},
  booktitle    = {International Conference on Computer Graphics and Interactive Techniques,
                  {SIGGRAPH} 2006, Boston, Massachusetts, USA, July 30 - August 3, 2006,
                  Courses},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1185657.1185745},
  doi          = {10.1145/1185657.1185745},
  timestamp    = {Mon, 15 Mar 2021 16:43:07 +0100},
  biburl       = {https://dblp.org/rec/conf/siggraph/RostBHSRMBS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siggraph/Hall06,
  author       = {Chris Hall},
  editor       = {John W. Finnegan and
                  Dave Shreiner},
  title        = {OpenGL {ES} Safety Critical},
  booktitle    = {International Conference on Computer Graphics and Interactive Techniques,
                  {SIGGRAPH} 2006, Boston, Massachusetts, USA, July 30 - August 3, 2006,
                  Courses},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1185657.1185749},
  doi          = {10.1145/1185657.1185749},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siggraph/Hall06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCAicis/HallCD02,
  author       = {Chris Hall and
                  Dar{-}Jen Chang and
                  Ahmed H. Desoky},
  editor       = {Adel Said Elmaghraby and
                  Robert Dees},
  title        = {Client/ Server Application for the Analysis of Gene Expressions},
  booktitle    = {Proceedings of the 11th Conference on Intelligent Systems: Emerging
                  Technologies, July 18-20, 2002, Boston, Massachusetts, {USA}},
  pages        = {191--196},
  publisher    = {{ISCA}},
  year         = {2002},
  timestamp    = {Mon, 09 Aug 2021 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ISCAicis/HallCD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/EllisonHMS00,
  author       = {Carl M. Ellison and
                  Chris Hall and
                  Randy Milbert and
                  Bruce Schneier},
  title        = {Protecting secret keys with personal entropy},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {16},
  number       = {4},
  pages        = {311--318},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-739X(99)00055-2},
  doi          = {10.1016/S0167-739X(99)00055-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/EllisonHMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KelseySWH00,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  title        = {Side Channel Cryptanalysis of Product Ciphers},
  journal      = {J. Comput. Secur.},
  volume       = {8},
  number       = {2/3},
  pages        = {141--158},
  year         = {2000},
  url          = {https://doi.org/10.3233/jcs-2000-82-304},
  doi          = {10.3233/JCS-2000-82-304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KelseySWH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HallGS99,
  author       = {Chris Hall and
                  Ian Goldberg and
                  Bruce Schneier},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Reaction Attacks against several Public-Key Cryptosystems},
  booktitle    = {Information and Communication Security, Second International Conference,
                  ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1726},
  pages        = {2--12},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-47942-0\_2},
  doi          = {10.1007/978-3-540-47942-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HallGS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HallWKS98,
  author       = {Chris Hall and
                  David A. Wagner and
                  John Kelsey and
                  Bruce Schneier},
  editor       = {Hugo Krawczyk},
  title        = {Building PRFs from PRPs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {370--389},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055742},
  doi          = {10.1007/BFB0055742},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HallWKS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KelseySWH98,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Side Channel Cryptanalysis of Product Ciphers},
  booktitle    = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055858},
  doi          = {10.1007/BFB0055858},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KelseySWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HallKSW98,
  author       = {Chris Hall and
                  John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Rafael Hirschfeld},
  title        = {Cryptanalysis of {SPEED}},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {309--310},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055491},
  doi          = {10.1007/BFB0055491},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HallKSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseySWH98,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalytic Attacks on Pseudorandom Number Generators},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {168--188},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_12},
  doi          = {10.1007/3-540-69710-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KelseySWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SchneierKWWH98,
  author       = {Bruce Schneier and
                  John Kelsey and
                  Doug Whiting and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {On the Twofish Key Schedule},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {27--42},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_3},
  doi          = {10.1007/3-540-48892-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SchneierKWWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HallKRSW98,
  author       = {Chris Hall and
                  John Kelsey and
                  Vincent Rijmen and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Cryptanalysis of {SPEED}},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_25},
  doi          = {10.1007/3-540-48892-8\_25},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HallKRSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchneierH97,
  author       = {Bruce Schneier and
                  Chris Hall},
  title        = {An Improved E-Mail Security Protocol},
  booktitle    = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
                  8-12 December 1997, San Diego, CA, {USA}},
  pages        = {227},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSAC.1997.646194},
  doi          = {10.1109/CSAC.1997.646194},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchneierH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HallS97,
  author       = {Chris Hall and
                  Bruce Schneier},
  title        = {Remote Electronic Gambling},
  booktitle    = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
                  8-12 December 1997, San Diego, CA, {USA}},
  pages        = {232--238},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSAC.1997.646195},
  doi          = {10.1109/CSAC.1997.646195},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HallS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KelseySHW97,
  author       = {John Kelsey and
                  Bruce Schneier and
                  Chris Hall and
                  David A. Wagner},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Secure Applications of Low-Entropy Keys},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {121--134},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030415},
  doi          = {10.1007/BFB0030415},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KelseySHW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KelseySH96,
  author       = {John Kelsey and
                  Bruce Schneier and
                  Chris Hall},
  title        = {An Authenticated Camera},
  booktitle    = {12th Annual Computer Security Applications Conference {(ACSAC} 1996),
                  9-13 December 1996, San Diego, CA, {USA}},
  pages        = {24--30},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSAC.1996.569666},
  doi          = {10.1109/CSAC.1996.569666},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KelseySH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics