The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Wagner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Niels Ferguson, Bruce Schneier, David Wagner
    Security Weaknesses in a Randomized Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:234-241 [Conf]
  2. Benjamin Schwarz, Hao Chen, David Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West
    Model Checking An Entire Linux Distribution for Security Violations. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:13-22 [Conf]
  3. Jason Waddle, David Wagner
    Fault Attacks on Dual-Rail Encoded Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:483-494 [Conf]
  4. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Niels Ferguson
    Comments on Twofish as an AES Candidate. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:355-356 [Conf]
  5. David Wagner
    Cryptanalysis of the Yi-Lam Hash. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:483-488 [Conf]
  6. David Wagner, Ian Goldberg
    Proofs of Security for the Unix Password Hashing Algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:560-572 [Conf]
  7. Hao Chen, David Wagner
    MOPS: an infrastructure for examining security properties of software. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:235-244 [Conf]
  8. Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner
    A Cryptanalysis of the High-Bandwidth Digital Content Protection System. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:192-200 [Conf]
  9. David Molnar, David Wagner
    Privacy and security in library RFID: issues, practices, and architectures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:210-219 [Conf]
  10. David Wagner, Paolo Soto
    Mimicry attacks on host-based intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:255-264 [Conf]
  11. David Wagner
    Cryptanalysis of a provably secure CRT-RSA algorithm. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:92-97 [Conf]
  12. Chris Karlof, David Wagner
    Hidden Markov Model Cryptoanalysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:17-34 [Conf]
  13. Jason Waddle, David Wagner
    Towards Efficient Second-Order Power Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:1-15 [Conf]
  14. Bruce Schneier, Mudge, David Wagner
    Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). [Citation Graph (0, 0)][DBLP]
    CQRE, 1999, pp:192-203 [Conf]
  15. Chris Hall, David Wagner, John Kelsey, Bruce Schneier
    Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:370-389 [Conf]
  16. John Kelsey, Bruce Schneier, David Wagner
    Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:237-251 [Conf]
  17. Yuval Ishai, Amit Sahai, David Wagner
    Private Circuits: Securing Hardware against Probing Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:463-481 [Conf]
  18. Lars R. Knudsen, Matthew J. B. Robshaw, David Wagner
    Truncated Differentials and Skipjack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:165-180 [Conf]
  19. Moses Liskov, Ronald L. Rivest, David Wagner
    Tweakable Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:31-46 [Conf]
  20. David Wagner
    A Generalized Birthday Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:288-303 [Conf]
  21. David Wagner, Bruce Schneier, John Kelsey
    Cryptoanalysis of the Cellular Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:526-537 [Conf]
  22. David Wagner
    Cryptographic Protocols for Electronic Voting. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:393- [Conf]
  23. Andre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner
    Relating Cryptography and Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:111-114 [Conf]
  24. Robert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner
    Homomorphic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:244-262 [Conf]
  25. Lillie Coney, Joseph Lorenzo Hall, Poorvi L. Vora, David Wagner
    Towards a privacy measurement criterion for voting systems. [Citation Graph (0, 0)][DBLP]
    DG.O, 2005, pp:287-288 [Conf]
  26. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:97-110 [Conf]
  27. Alex Biryukov, David Wagner
    Advanced Slide Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:589-606 [Conf]
  28. Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner
    Private Circuits II: Keeping Secrets in Tamperable Circuits. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:308-327 [Conf]
  29. Chris Hall, John Kelsey, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:309-310 [Conf]
  30. Don Coppersmith, David Wagner, Bruce Schneier, John Kelsey
    Cryptanalysis of TWOPRIME. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:32-48 [Conf]
  31. Mihir Bellare, Phillip Rogaway, David Wagner
    The EAX Mode of Operation. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:389-407 [Conf]
  32. Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting
    Improved Cryptanalysis of Rijndael. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:213-230 [Conf]
  33. Alex Biryukov, Adi Shamir, David Wagner
    Real Time Cryptanalysis of A5/1 on a PC. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:1-18 [Conf]
  34. Alex Biryukov, David Wagner
    Slide Attacks. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:245-259 [Conf]
  35. Nikita Borisov, Monica Chew, Robert Johnson, David Wagner
    Multiplicative Differentials. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:17-33 [Conf]
  36. John Kelsey, Bruce Schneier, David Wagner
    Mod n Cryptanalysis, with Applications Against RC5P and M6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:139-155 [Conf]
  37. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:168-188 [Conf]
  38. Lars R. Knudsen, David Wagner
    Integral Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:112-127 [Conf]
  39. David Wagner
    Towards a Unifying View of Block Cipher Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:16-33 [Conf]
  40. David Wagner
    Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:254-269 [Conf]
  41. David Wagner
    Differential Cryptanalysis of KHF. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:293-296 [Conf]
  42. David Wagner
    The Boomerang Attack. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:156-170 [Conf]
  43. John Kelsey, Bruce Schneier, David Wagner
    Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:233-246 [Conf]
  44. David Molnar, Matt Piotrowski, David Schultz, David Wagner
    The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:156-168 [Conf]
  45. Stark C. Draper, Prakash Ishwar, David Molnar, Vinod Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David Wagner
    An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:327-341 [Conf]
  46. Will Ivancic, David Wagner, Aviel D. Rubin, Paul Ratazzi, James P. G. Sterbenz
    Securing Wireless and Mobile Networks - Is It Possible? [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  47. John Kelsey, Bruce Schneier, Chris Hall, David Wagner
    Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:121-134 [Conf]
  48. David Wagner
    Cryptanalysis of an Algebraic Privacy Homomorphism. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:234-239 [Conf]
  49. Dirk Grunwald, Gary J. Nutt, Anthony M. Sloane, David Wagner, Benjamin G. Zorn
    A Testbed for Studying Parallel Programs and Parallel Execution Architectures. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1993, pp:95-106 [Conf]
  50. Nikita Borisov, Ian Goldberg, David Wagner
    Intercepting mobile communications: the insecurity of 802.11. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:180-189 [Conf]
  51. Hao Chen, Drew Dean, David Wagner
    Model Checking One Million Lines of C Code. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  52. David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  53. Chris Crutchfield, David Molnar, David Turner, David Wagner
    Generic On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:58-74 [Conf]
  54. Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner
    Cool security trends. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:53- [Conf]
  55. David Molnar, Andrea Soppera, David Wagner
    A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:276-290 [Conf]
  56. Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:319-338 [Conf]
  57. Ben Reichardt, David Wagner
    Markov Truncated Differential Cryptanalysis of Skipjack. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:110-128 [Conf]
  58. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall
    On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:27-42 [Conf]
  59. David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
    Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
  60. David Wagner
    Static Analysis and Software Assurance. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:431- [Conf]
  61. David Wagner
    Resilient aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:78-87 [Conf]
  62. Chris Karlof, Naveen Sastry, David Wagner
    TinySec: a link layer security architecture for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2004, pp:162-175 [Conf]
  63. David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
    Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:365-370 [Conf]
  64. David Wagner, Drew Dean
    Intrusion Detection via Static Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:156-0 [Conf]
  65. Dawn Xiaodong Song, David Wagner, Adrian Perrig
    Practical Techniques for Searches on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:44-55 [Conf]
  66. Philippe Golle, David Wagner
    Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:66-70 [Conf]
  67. David Wagner
    Pushdown Model Checking for Security. [Citation Graph (0, 0)][DBLP]
    SPIN, 2005, pp:1- [Conf]
  68. John Kelsey, Bruce Schneier, David Wagner
    Protocol Interactions and the Chosen Protocol Attack. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:91-104 [Conf]
  69. Zhendong Su, David Wagner
    A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings. [Citation Graph (0, 0)][DBLP]
    TACAS, 2004, pp:280-295 [Conf]
  70. Nicholas Hopper, David Molnar, David Wagner
    From Weak to Strong Watermarking. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:362-382 [Conf]
  71. Mark Johnson, David Wagner, Kannan Ramchandran
    On Compressing Encrypted Data without the Encryption Key. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:491-504 [Conf]
  72. Ian Goldberg, Steven D. Gribble, David Wagner, Eric A. Brewer
    The Ninja Jukebox. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  73. Hao Chen, David Wagner, Drew Dean
    Setuid Demystified. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:171-190 [Conf]
  74. Robert Johnson, David Wagner
    Finding User/Kernel Pointer Bugs with Type Inference. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:119-134 [Conf]
  75. David Molnar, Andrea Soppera, David Wagner
    Privacy for RFID through trusted computing. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:31-34 [Conf]
  76. Nathan Good, David Molnar, Jennifer M. Urban, Deirdre K. Mulligan, Elizabeth Miles, Laura Quilter, David Wagner
    Radio frequency Id and privacy with information goods. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:41-42 [Conf]
  77. Naveen Sastry, Umesh Shankar, David Wagner
    Secure verification of location claims. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:1-10 [Conf]
  78. Naveen Sastry, David Wagner
    Security considerations for IEEE 802.15.4 networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:32-42 [Conf]
  79. Chris Karlof, David Wagner
    Secure routing in wireless sensor networks: attacks and countermeasures. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2003, v:1, n:2-3, pp:293-315 [Journal]
  80. Nancy Cam-Winget, Russell Housley, David Wagner, Jesse Walker
    Security flaws in 802.11 data link protocols. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:5, pp:35-39 [Journal]
  81. David Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner
    Analyzing internet voting security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:10, pp:59-64 [Journal]
  82. Adrian Perrig, John A. Stankovic, David Wagner
    Security in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:6, pp:53-57 [Journal]
  83. Raphael Chung-Wei Phan, David Wagner
    Security considerations for incremental hash functions based on pair block chaining. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:131-136 [Journal]
  84. Lars R. Knudsen, David Wagner
    On the structure of Skipjack. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2001, v:111, n:1-2, pp:103-116 [Journal]
  85. Ian Goldberg, David Wagner
    TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web. [Citation Graph (0, 0)][DBLP]
    First Monday, 1998, v:3, n:4, pp:- [Journal]
  86. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  87. Brian Alspach, Paul J. Schellenberg, Douglas R. Stinson, David Wagner
    The Oberwolfach problem and factors of uniform odd length cycles. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1989, v:52, n:1, pp:20-43 [Journal]
  88. Zhendong Su, David Wagner
    A class of polynomially solvable range constraints for interval analysis without widenings. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:345, n:1, pp:122-138 [Journal]
  89. Matt Bishop, David Wagner
    Risks of e-voting. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:11, pp:120- [Journal]

  90. Dynamic pharming attacks and locked same-origin policies for web browsers. [Citation Graph (, )][DBLP]


  91. Verifiable functional purity in java. [Citation Graph (, )][DBLP]


  92. On voting machine design for verification and testability. [Citation Graph (, )][DBLP]


  93. Portably Solving File TOCTTOU Races with Hardness Amplification. [Citation Graph (, )][DBLP]


  94. Algebraic and Slide Attacks on KeeLoq. [Citation Graph (, )][DBLP]


  95. C++ Dynamic Cast in Autonomous Space Systems. [Citation Graph (, )][DBLP]


  96. Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. [Citation Graph (, )][DBLP]


  97. A User Study Design for Comparing the Security of Registration Protocols. [Citation Graph (, )][DBLP]


  98. Object capabilities for security. [Citation Graph (, )][DBLP]


  99. Large-scale analysis of format string vulnerabilities in Debian Linux. [Citation Graph (, )][DBLP]


  100. Replayable Voting Machine Audit Logs. [Citation Graph (, )][DBLP]


  101. You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. [Citation Graph (, )][DBLP]


  102. Fine-grained privilege separation for web applications. [Citation Graph (, )][DBLP]


  103. Multicast Mobility in Heterogeneous Technologies: Experimental Validation. [Citation Graph (, )][DBLP]


  104. Efficient character-level taint tracking for Java. [Citation Graph (, )][DBLP]


  105. Conditioned-safe ceremonies and a user study of an application to web authentication. [Citation Graph (, )][DBLP]


  106. Policy based QoS Monitoring: Automated Learning Strategies for Policy Enhancement. [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.022secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002