Bruce Schneier

Orcid: 0000-0003-1453-1083

Affiliations:
  • Harvard Kennedy School, USA


According to our database1, Bruce Schneier authored at least 159 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LLMs' Data-Control Path Insecurity.
Commun. ACM, September, 2024

Bugs in our pockets: the risks of client-side scanning.
J. Cybersecur., January, 2024

How will advanced AI systems impact democracy?
CoRR, 2024

Devising and Detecting Phishing Emails Using Large Language Models.
IEEE Access, 2024

2023
Reflections on Ten Years Past the Snowden Revelations.
RFC, July, 2023

Trustworthy AI Means Public AI [Last Word].
IEEE Secur. Priv., 2023

Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models.
CoRR, 2023

Demonstrations of the Potential of AI-based Political Issue Polling.
CoRR, 2023

2022
NIST's Post-Quantum Cryptography Standards Competition.
IEEE Secur. Priv., 2022

Robot Hacking Games.
IEEE Secur. Priv., 2022

2021
What Will It Take?
IEEE Secur. Priv., 2021

Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

Machine Learning Featurizations for AI Hacking of Political Systems.
CoRR, 2021

Invited Talk: The Coming AI Hackers.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
Hacking the Tax Code.
IEEE Secur. Priv., 2020

Technologists vs. Policy Makers.
IEEE Secur. Priv., 2020

Privacy threats in intimate relationships.
J. Cybersecur., 2020

Legal Risks of Adversarial Machine Learning Research.
CoRR, 2020

Politics of Adversarial Machine Learning.
CoRR, 2020

Attacking Machine Learning Systems.
Computer, 2020

2019
Cybersecurity for the Public Interest.
IEEE Secur. Priv., 2019

2018
Unnoticed Consent [Last Word].
IEEE Secur. Priv., 2018

Cryptography after the Aliens Land.
IEEE Secur. Priv., 2018

Artificial Intelligence and the Attack/Defense Balance.
IEEE Secur. Priv., 2018

2017
IoT Security: What's Plan B?
IEEE Secur. Priv., 2017

The Internet of Things Will Upend Our Industry.
IEEE Secur. Priv., 2017

2016
Stop Trying to Fix the User.
IEEE Secur. Priv., 2016

Cryptography Is Harder than It Looks.
IEEE Secur. Priv., 2016

2015
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement.
RFC, August, 2015

Ubiquitous Surveillance and Security [Keynote].
IEEE Technol. Soc. Mag., 2015

The Security Value of Muddling Through.
IEEE Secur. Priv., 2015

Surreptitiously Weakening Cryptographic Systems.
IACR Cryptol. ePrint Arch., 2015

Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

Keys under doormats.
Commun. ACM, 2015

2014
The Future of Incident Response.
IEEE Secur. Priv., 2014

Metadata = Surveillance.
IEEE Secur. Priv., 2014

2013
Trust in Man/Machine Security Systems.
IEEE Secur. Priv., 2013

IT for Oppression.
IEEE Secur. Priv., 2013

2012
The Importance of Security Engineering.
IEEE Secur. Priv., 2012

How Changing Technology Affects Security.
IEEE Secur. Priv., 2012

2011
Solitaire.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Empathy and Security.
IEEE Secur. Priv., 2011

Detecting Cheaters.
IEEE Secur. Priv., 2011

2010
Special issue on security and trust management for dynamic coalitions.
Secur. Commun. Networks, 2010

Schneier on Security: Privacy and Control.
J. Priv. Confidentiality, 2010

A Taxonomy of Social Networking Data.
IEEE Secur. Priv., 2010

Security and Function Creep.
IEEE Secur. Priv., 2010

Cryptography Engineering - Design Principles and Practical Applications.
Wiley, ISBN: 978-0-470-47424-2, 2010

2009
Security, Group Size, and the Human Brain.
IEEE Secur. Priv., 2009

Architecture of Privacy.
IEEE Secur. Priv., 2009

2008
How the Human Brain Buys Security.
IEEE Secur. Priv., 2008

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Schneier on security.
Wiley, ISBN: 978-0-470-39535-6, 2008

2007
The Death of the Security Industry.
IEEE Secur. Priv., 2007

Nonsecurity Considerations in Security Decisions.
IEEE Secur. Priv., 2007

The psychology of security.
Commun. ACM, 2007

2006
University Networks and Data Security.
IEEE Secur. Priv., 2006

Beyond fear - thinking sensibly about security in an uncertain world.
Springer, ISBN: 978-0-387-02620-6, 2006

Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C: der Klassiker.
Pearson Education, ISBN: 978-3-8273-7228-4, 2006

2005
Attacks on Cryptographic Hashes in Internet Protocols.
RFC, November, 2005

Solitaire.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Attack trends: 2004 and 2005.
ACM Queue, 2005

The Zotob Storm.
IEEE Secur. Priv., 2005

Authentication and Expiration.
IEEE Secur. Priv., 2005

Guest Editors' Introduction: Economics of Information Security.
IEEE Secur. Priv., 2005

Risks of third-party data.
Commun. ACM, 2005

Two-factor authentication: too little, too late.
Commun. ACM, 2005

2004
Evaluating Security Systems: A Five-Step Process.
Proceedings of the Economics of Information Security, 2004

Sensible Authentication.
ACM Queue, 2004

SIMS: Solution, or Part of the Problem?
IEEE Secur. Priv., 2004

Customers, Passwords, and Web Sites.
IEEE Secur. Priv., 2004

Security and Compliance.
IEEE Secur. Priv., 2004

Voting Security and Technology.
IEEE Secur. Priv., 2004

Second Preimages on n-bit Hash Functions for Much Less than 2<sup>n</sup> Work.
IACR Cryptol. ePrint Arch., 2004

Hacking the Business Climate for Network Security.
Computer, 2004

The nonsecurity of secrecy.
Commun. ACM, 2004

Insider risks in elections.
Commun. ACM, 2004

Secrets and lies - digital security in a networked world: with new information about post-9/11 security.
Wiley, ISBN: 978-0-471-45380-2, 2004

Secrets and lies - IT-Sicherheit in einer vernetzten Welt.
dpunkt.verlag, ISBN: 978-3-89864-302-3, 2004

2003
Airplane Hackers.
IEEE Secur. Priv., 2003

The Speed of Security.
IEEE Secur. Priv., 2003

Guilty Until Proven Innocent?
IEEE Secur. Priv., 2003

Locks and Full Disclosure.
IEEE Secur. Priv., 2003

We Are All Security Consumers.
IEEE Secur. Priv., 2003

Voting and technology: who gets to count your vote?
Commun. ACM, 2003

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Practical cryptography.
Wiley, ISBN: 978-0-471-22357-3, 2003

2002
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.
Proceedings of the Information Security, 5th International Conference, 2002

2001
Managed Security Monitoring: Network Security for the 21st Centur.
Comput. Secur., 2001

The perils of port 80.
Commun. ACM, 2001

Cyber underwriters lab.
Commun. ACM, 2001

Insurance and the computer industry.
Commun. ACM, 2001

2000
Side Channel Cryptanalysis of Product Ciphers.
J. Comput. Secur., 2000

Protecting secret keys with personal entropy.
Future Gener. Comput. Syst., 2000

A Self-Study Course in Block-Cipher Cryptanalysis.
Cryptologia, 2000

Semantic network attacks.
Commun. ACM, 2000

Risks of PKI: E-Commerce.
Commun. ACM, 2000

Risks of PKI: Secure Email.
Commun. ACM, 2000

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols.
Proceedings of the 9th USENIX Security Symposium, 2000

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Improved Cryptanalysis of Rijndael.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

A Performance Comparison of the Five AES Finalists.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

Comments on Twofish as an AES Candidate.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

Preliminary Cryptanalysis of Reduced-Round Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

Security Weaknesses in a Randomized Stream Cipher.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Secure Audit Logs to Support Computer Forensics.
ACM Trans. Inf. Syst. Secur., 1999

The Street Performer Protocol and Digital Copyrights.
First Monday, 1999

Cryptography: The Importance of Not Being Different.
Computer, 1999

Risks of Relying on Cryptography.
Commun. ACM, 1999

The Trojan Horse Race.
Commun. ACM, 1999

The Uses and Abuses of Biometrics.
Commun. ACM, 1999

Authenticating Secure Tokens Using Slow Memory Access.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Key-Schedule Cryptanalysis of DEAL.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

Reaction Attacks against several Public-Key Cryptosystems.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Mod n Cryptanalysis, with Applications Against RC5P and M6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2).
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
Security pitfalls in cryptographic design.
Inf. Manag. Comput. Secur., 1998

Cryptographic Design Vulnerabilities.
Computer, 1998

Electronic Commerce and the Street Performer.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Cryptographic Support for Secure Logs on Untrusted Machines.
Proceedings of the 7th USENIX Security Symposium, 1998

Cryptanalysis of ORYX.
Proceedings of the Selected Areas in Cryptography '98, 1998

On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998

Toward a Secure System Engineering Methodolgy.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

Environmental Key Generation Towards Clueless Agents.
Proceedings of the Mobile Agents and Security, 1998

Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of TWOPRIME.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998

Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998

Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP).
Proceedings of the CCS '98, 1998

Twofish on Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Secure Authentication with Multiple Parallel Keys.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

A Certified E-Mail Protocol.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997

Remote auditing of software outputs using a trusted coprocessor.
Future Gener. Comput. Syst., 1997

Cryptography, Security, and the Future.
Commun. ACM, 1997

Protocol Interactions and the Chosen Protocol Attack.
Proceedings of the Security Protocols, 1997

Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997

Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
Proceedings of the Information and Communication Security, First International Conference, 1997

Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Cryptanalysis of the Cellular Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1997

Conditional Purchase Orders.
Proceedings of the CCS '97, 1997

An Improved E-Mail Security Protocol.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Remote Electronic Gambling.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
Securing the World Wide Web: Smart Tokens and Their Implementation.
World Wide Web J., 1996

Automatic Event-Stream Notarization Using Digital Signatures.
Proceedings of the Security Protocols, 1996

Unbalanced Feistel Networks and Block Cipher Design.
Proceedings of the Fast Software Encryption, 1996

Distributed Proctoring.
Proceedings of the Computer Security, 1996

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
Proceedings of the Advances in Cryptology, 1996

Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

An Authenticated Camera.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C.
Informationssicherheit, Addison-Wesley, ISBN: 978-3-89319-854-2, 1996

Applied cryptography - protocols, algorithms, and source code in C, 2nd Edition.
Wiley, ISBN: 0-471-12845-7, 1996

1994
Designing encryption algorithms for real people.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994

The MacGuffin Block Cipher Algorithm.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

1993
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish).
Proceedings of the Fast Software Encryption, 1993


  Loading...