Search the dblp DataBase
David Wagner :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Niels Ferguson , Bruce Schneier , David Wagner Security Weaknesses in a Randomized Stream Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:234-241 [Conf ] Benjamin Schwarz , Hao Chen , David Wagner , Jeremy Lin , Wei Tu , Geoff Morrison , Jacob West Model Checking An Entire Linux Distribution for Security Violations. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:13-22 [Conf ] Jason Waddle , David Wagner Fault Attacks on Dual-Rail Encoded Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:483-494 [Conf ] Bruce Schneier , John Kelsey , Doug Whiting , David Wagner , Niels Ferguson Comments on Twofish as an AES Candidate. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:355-356 [Conf ] David Wagner Cryptanalysis of the Yi-Lam Hash. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:483-488 [Conf ] David Wagner , Ian Goldberg Proofs of Security for the Unix Password Hashing Algorithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:560-572 [Conf ] Hao Chen , David Wagner MOPS: an infrastructure for examining security properties of software. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:235-244 [Conf ] Scott Crosby , Ian Goldberg , Robert Johnson , Dawn Xiaodong Song , David Wagner A Cryptanalysis of the High-Bandwidth Digital Content Protection System. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2001, pp:192-200 [Conf ] David Molnar , David Wagner Privacy and security in library RFID: issues, practices, and architectures. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:210-219 [Conf ] David Wagner , Paolo Soto Mimicry attacks on host-based intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:255-264 [Conf ] David Wagner Cryptanalysis of a provably secure CRT-RSA algorithm. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:92-97 [Conf ] Chris Karlof , David Wagner Hidden Markov Model Cryptoanalysis. [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:17-34 [Conf ] Jason Waddle , David Wagner Towards Efficient Second-Order Power Analysis. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:1-15 [Conf ] Bruce Schneier , Mudge , David Wagner Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). [Citation Graph (0, 0)][DBLP ] CQRE, 1999, pp:192-203 [Conf ] Chris Hall , David Wagner , John Kelsey , Bruce Schneier Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:370-389 [Conf ] John Kelsey , Bruce Schneier , David Wagner Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:237-251 [Conf ] Yuval Ishai , Amit Sahai , David Wagner Private Circuits: Securing Hardware against Probing Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:463-481 [Conf ] Lars R. Knudsen , Matthew J. B. Robshaw , David Wagner Truncated Differentials and Skipjack. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:165-180 [Conf ] Moses Liskov , Ronald L. Rivest , David Wagner Tweakable Block Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:31-46 [Conf ] David Wagner A Generalized Birthday Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:288-303 [Conf ] David Wagner , Bruce Schneier , John Kelsey Cryptoanalysis of the Cellular Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:526-537 [Conf ] David Wagner Cryptographic Protocols for Electronic Voting. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:393- [Conf ] Andre Scedrov , Ran Canetti , Joshua D. Guttman , David Wagner , Michael Waidner Relating Cryptography and Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:111-114 [Conf ] Robert Johnson , David Molnar , Dawn Xiaodong Song , David Wagner Homomorphic Signature Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:244-262 [Conf ] Lillie Coney , Joseph Lorenzo Hall , Poorvi L. Vora , David Wagner Towards a privacy measurement criterion for voting systems. [Citation Graph (0, 0)][DBLP ] DG.O, 2005, pp:287-288 [Conf ] John Kelsey , Bruce Schneier , David Wagner , Chris Hall Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:97-110 [Conf ] Alex Biryukov , David Wagner Advanced Slide Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:589-606 [Conf ] Yuval Ishai , Manoj Prabhakaran , Amit Sahai , David Wagner Private Circuits II: Keeping Secrets in Tamperable Circuits. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:308-327 [Conf ] Chris Hall , John Kelsey , Bruce Schneier , David Wagner Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:309-310 [Conf ] Don Coppersmith , David Wagner , Bruce Schneier , John Kelsey Cryptanalysis of TWOPRIME. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:32-48 [Conf ] Mihir Bellare , Phillip Rogaway , David Wagner The EAX Mode of Operation. [Citation Graph (0, 0)][DBLP ] FSE, 2004, pp:389-407 [Conf ] Niels Ferguson , John Kelsey , Stefan Lucks , Bruce Schneier , Michael Stay , David Wagner , Doug Whiting Improved Cryptanalysis of Rijndael. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:213-230 [Conf ] Alex Biryukov , Adi Shamir , David Wagner Real Time Cryptanalysis of A5/1 on a PC. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:1-18 [Conf ] Alex Biryukov , David Wagner Slide Attacks. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:245-259 [Conf ] Nikita Borisov , Monica Chew , Robert Johnson , David Wagner Multiplicative Differentials. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:17-33 [Conf ] John Kelsey , Bruce Schneier , David Wagner Mod n Cryptanalysis, with Applications Against RC5P and M6. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:139-155 [Conf ] John Kelsey , Bruce Schneier , David Wagner , Chris Hall Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:168-188 [Conf ] Lars R. Knudsen , David Wagner Integral Cryptanalysis. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:112-127 [Conf ] David Wagner Towards a Unifying View of Block Cipher Cryptanalysis. [Citation Graph (0, 0)][DBLP ] FSE, 2004, pp:16-33 [Conf ] David Wagner Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:254-269 [Conf ] David Wagner Differential Cryptanalysis of KHF. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:293-296 [Conf ] David Wagner The Boomerang Attack. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:156-170 [Conf ] John Kelsey , Bruce Schneier , David Wagner Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:233-246 [Conf ] David Molnar , Matt Piotrowski , David Schultz , David Wagner The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:156-168 [Conf ] Stark C. Draper , Prakash Ishwar , David Molnar , Vinod Prabhakaran , Kannan Ramchandran , Daniel Schonberg , David Wagner An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:327-341 [Conf ] Will Ivancic , David Wagner , Aviel D. Rubin , Paul Ratazzi , James P. G. Sterbenz Securing Wireless and Mobile Networks - Is It Possible? [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] John Kelsey , Bruce Schneier , Chris Hall , David Wagner Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:121-134 [Conf ] David Wagner Cryptanalysis of an Algebraic Privacy Homomorphism. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:234-239 [Conf ] Dirk Grunwald , Gary J. Nutt , Anthony M. Sloane , David Wagner , Benjamin G. Zorn A Testbed for Studying Parallel Programs and Parallel Execution Architectures. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1993, pp:95-106 [Conf ] Nikita Borisov , Ian Goldberg , David Wagner Intercepting mobile communications: the insecurity of 802.11. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2001, pp:180-189 [Conf ] Hao Chen , Drew Dean , David Wagner Model Checking One Million Lines of C Code. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] David Wagner , Jeffrey S. Foster , Eric A. Brewer , Alexander Aiken A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Chris Crutchfield , David Molnar , David Turner , David Wagner Generic On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:58-74 [Conf ] Dawson R. Engler , Cynthia E. Irvine , Trent Jaeger , David Wagner Cool security trends. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:53- [Conf ] David Molnar , Andrea Soppera , David Wagner A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:276-290 [Conf ] Chris Hall , John Kelsey , Vincent Rijmen , Bruce Schneier , David Wagner Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:319-338 [Conf ] Ben Reichardt , David Wagner Markov Truncated Differential Cryptanalysis of Skipjack. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:110-128 [Conf ] Bruce Schneier , John Kelsey , Doug Whiting , David Wagner , Chris Hall On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:27-42 [Conf ] David Wagner , Leone Simpson , Ed Dawson , John Kelsey , William Millan , Bruce Schneier Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:296-305 [Conf ] David Wagner Static Analysis and Software Assurance. [Citation Graph (0, 0)][DBLP ] SAS, 2001, pp:431- [Conf ] David Wagner Resilient aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2004, pp:78-87 [Conf ] Chris Karlof , Naveen Sastry , David Wagner TinySec: a link layer security architecture for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2004, pp:162-175 [Conf ] David Molnar , Tadayoshi Kohno , Naveen Sastry , David Wagner Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:365-370 [Conf ] David Wagner , Drew Dean Intrusion Detection via Static Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:156-0 [Conf ] Dawn Xiaodong Song , David Wagner , Adrian Perrig Practical Techniques for Searches on Encrypted Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:44-55 [Conf ] Philippe Golle , David Wagner Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:66-70 [Conf ] David Wagner Pushdown Model Checking for Security. [Citation Graph (0, 0)][DBLP ] SPIN, 2005, pp:1- [Conf ] John Kelsey , Bruce Schneier , David Wagner Protocol Interactions and the Chosen Protocol Attack. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:91-104 [Conf ] Zhendong Su , David Wagner A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings. [Citation Graph (0, 0)][DBLP ] TACAS, 2004, pp:280-295 [Conf ] Nicholas Hopper , David Molnar , David Wagner From Weak to Strong Watermarking. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:362-382 [Conf ] Mark Johnson , David Wagner , Kannan Ramchandran On Compressing Encrypted Data without the Encryption Key. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:491-504 [Conf ] Ian Goldberg , Steven D. Gribble , David Wagner , Eric A. Brewer The Ninja Jukebox. [Citation Graph (0, 0)][DBLP ] USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf ] Hao Chen , David Wagner , Drew Dean Setuid Demystified. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:171-190 [Conf ] Robert Johnson , David Wagner Finding User/Kernel Pointer Bugs with Type Inference. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:119-134 [Conf ] David Molnar , Andrea Soppera , David Wagner Privacy for RFID through trusted computing. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:31-34 [Conf ] Nathan Good , David Molnar , Jennifer M. Urban , Deirdre K. Mulligan , Elizabeth Miles , Laura Quilter , David Wagner Radio frequency Id and privacy with information goods. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:41-42 [Conf ] Naveen Sastry , Umesh Shankar , David Wagner Secure verification of location claims. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2003, pp:1-10 [Conf ] Naveen Sastry , David Wagner Security considerations for IEEE 802.15.4 networks. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2004, pp:32-42 [Conf ] Chris Karlof , David Wagner Secure routing in wireless sensor networks: attacks and countermeasures. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2003, v:1, n:2-3, pp:293-315 [Journal ] Nancy Cam-Winget , Russell Housley , David Wagner , Jesse Walker Security flaws in 802.11 data link protocols. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:5, pp:35-39 [Journal ] David Jefferson , Aviel D. Rubin , Barbara Simons , David Wagner Analyzing internet voting security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:10, pp:59-64 [Journal ] Adrian Perrig , John A. Stankovic , David Wagner Security in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:6, pp:53-57 [Journal ] Raphael Chung-Wei Phan , David Wagner Security considerations for incremental hash functions based on pair block chaining. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:131-136 [Journal ] Lars R. Knudsen , David Wagner On the structure of Skipjack. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2001, v:111, n:1-2, pp:103-116 [Journal ] Ian Goldberg , David Wagner TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web. [Citation Graph (0, 0)][DBLP ] First Monday, 1998, v:3, n:4, pp:- [Journal ] John Kelsey , Bruce Schneier , David Wagner , Chris Hall Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal ] Brian Alspach , Paul J. Schellenberg , Douglas R. Stinson , David Wagner The Oberwolfach problem and factors of uniform odd length cycles. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1989, v:52, n:1, pp:20-43 [Journal ] Zhendong Su , David Wagner A class of polynomially solvable range constraints for interval analysis without widenings. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:345, n:1, pp:122-138 [Journal ] Matt Bishop , David Wagner Risks of e-voting. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:11, pp:120- [Journal ] Dynamic pharming attacks and locked same-origin policies for web browsers. [Citation Graph (, )][DBLP ] Verifiable functional purity in java. [Citation Graph (, )][DBLP ] On voting machine design for verification and testability. [Citation Graph (, )][DBLP ] Portably Solving File TOCTTOU Races with Hardness Amplification. [Citation Graph (, )][DBLP ] Algebraic and Slide Attacks on KeeLoq. [Citation Graph (, )][DBLP ] C++ Dynamic Cast in Autonomous Space Systems. [Citation Graph (, )][DBLP ] Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. [Citation Graph (, )][DBLP ] A User Study Design for Comparing the Security of Registration Protocols. [Citation Graph (, )][DBLP ] Object capabilities for security. [Citation Graph (, )][DBLP ] Large-scale analysis of format string vulnerabilities in Debian Linux. [Citation Graph (, )][DBLP ] Replayable Voting Machine Audit Logs. [Citation Graph (, )][DBLP ] You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. [Citation Graph (, )][DBLP ] Fine-grained privilege separation for web applications. [Citation Graph (, )][DBLP ] Multicast Mobility in Heterogeneous Technologies: Experimental Validation. [Citation Graph (, )][DBLP ] Efficient character-level taint tracking for Java. [Citation Graph (, )][DBLP ] Conditioned-safe ceremonies and a user study of an application to web authentication. [Citation Graph (, )][DBLP ] Policy based QoS Monitoring: Automated Learning Strategies for Policy Enhancement. [Citation Graph (, )][DBLP ] Search in 0.019secs, Finished in 0.022secs