2008 |
101 | | David Wagner:
Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings
Springer 2008 |
100 | EE | Matthew Finifter,
Adrian Mettler,
Naveen Sastry,
David Wagner:
Verifiable functional purity in java.
ACM Conference on Computer and Communications Security 2008: 161-174 |
99 | EE | Arel Cordero,
David Wagner:
Replayable Voting Machine Audit Logs.
EVT 2008 |
98 | EE | J. Alex Halderman,
Eric Rescorla,
Hovav Shacham,
David Wagner:
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
EVT 2008 |
97 | EE | Dan Tsafrir,
Tomer Hertz,
David Wagner,
Dilma Da Silva:
Portably Solving File TOCTTOU Races with Hardness Amplification.
FAST 2008: 189-206 |
96 | EE | Nicolas Courtois,
Gregory V. Bard,
David Wagner:
Algebraic and Slide Attacks on KeeLoq.
FSE 2008: 97-115 |
95 | EE | Damian Dechev,
Rabi N. Mahapatra,
Bjarne Stroustrup,
David Wagner:
C++ Dynamic Cast in Autonomous Space Systems.
ISORC 2008: 499-507 |
94 | EE | Chris Karlof,
J. Doug Tygar,
David Wagner:
A User Study Design for Comparing the Security of Registration Protocols.
UPSEC 2008 |
93 | EE | Dan Tsafrir,
Tomer Hertz,
David Wagner,
Dilma Da Silva:
Portably solving file races with hardness amplification.
TOS 4(3): (2008) |
2007 |
92 | EE | Chris Karlof,
Umesh Shankar,
J. Doug Tygar,
David Wagner:
Dynamic pharming attacks and locked same-origin policies for web browsers.
ACM Conference on Computer and Communications Security 2007: 58-71 |
91 | EE | Philippe Golle,
David Wagner:
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract).
IEEE Symposium on Security and Privacy 2007: 66-70 |
90 | EE | Karl Chen,
David Wagner:
Large-scale analysis of format string vulnerabilities in Debian Linux.
PLAS 2007: 75-84 |
89 | EE | Nicholas Hopper,
David Molnar,
David Wagner:
From Weak to Strong Watermarking.
TCC 2007: 362-382 |
88 | EE | Matt Bishop,
David Wagner:
Risks of e-voting.
Commun. ACM 50(11): 120 (2007) |
2006 |
87 | EE | David Wagner:
Cryptographic Protocols for Electronic Voting.
CRYPTO 2006: 393 |
86 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai,
David Wagner:
Private Circuits II: Keeping Secrets in Tamperable Circuits.
EUROCRYPT 2006: 308-327 |
85 | EE | David Molnar,
Tadayoshi Kohno,
Naveen Sastry,
David Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 365-370 |
84 | EE | David Wagner:
Object capabilities for security.
PLAS 2006: 1-2 |
83 | EE | Chris Crutchfield,
David Molnar,
David Turner,
David Wagner:
Generic On-Line/Off-Line Threshold Signatures.
Public Key Cryptography 2006: 58-74 |
82 | EE | Raphael Chung-Wei Phan,
David Wagner:
Security considerations for incremental hash functions based on pair block chaining.
Computers & Security 25(2): 131-136 (2006) |
2005 |
81 | EE | Benjamin Schwarz,
Hao Chen,
David Wagner,
Jeremy Lin,
Wei Tu,
Geoff Morrison,
Jacob West:
Model Checking An Entire Linux Distribution for Security Violations.
ACSAC 2005: 13-22 |
80 | EE | Jason Waddle,
David Wagner:
Fault Attacks on Dual-Rail Encoded Systems.
ACSAC 2005: 483-494 |
79 | EE | Lillie Coney,
Joseph Lorenzo Hall,
Poorvi L. Vora,
David Wagner:
Towards a privacy measurement criterion for voting systems.
DG.O 2005: 287-288 |
78 | EE | David Molnar,
Matt Piotrowski,
David Schultz,
David Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
ICISC 2005: 156-168 |
77 | EE | Stark C. Draper,
Prakash Ishwar,
David Molnar,
Vinod M. Prabhakaran,
Kannan Ramchandran,
Daniel Schonberg,
David Wagner:
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
Information Hiding 2005: 327-341 |
76 | EE | David Wagner:
Pushdown Model Checking for Security.
SPIN 2005: 1 |
75 | EE | David Molnar,
Andrea Soppera,
David Wagner:
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
Selected Areas in Cryptography 2005: 276-290 |
74 | EE | David Molnar,
Andrea Soppera,
David Wagner:
Privacy for RFID through trusted computing.
WPES 2005: 31-34 |
73 | EE | Zhendong Su,
David Wagner:
A class of polynomially solvable range constraints for interval analysis without widenings.
Theor. Comput. Sci. 345(1): 122-138 (2005) |
2004 |
72 | EE | David Molnar,
David Wagner:
Privacy and security in library RFID: issues, practices, and architectures.
ACM Conference on Computer and Communications Security 2004: 210-219 |
71 | EE | David Wagner:
Cryptanalysis of a provably secure CRT-RSA algorithm.
ACM Conference on Computer and Communications Security 2004: 92-97 |
70 | EE | Jason Waddle,
David Wagner:
Towards Efficient Second-Order Power Analysis.
CHES 2004: 1-15 |
69 | EE | David Wagner:
Towards a Unifying View of Block Cipher Cryptanalysis.
FSE 2004: 16-33 |
68 | EE | Mihir Bellare,
Phillip Rogaway,
David Wagner:
The EAX Mode of Operation.
FSE 2004: 389-407 |
67 | EE | Hao Chen,
Drew Dean,
David Wagner:
Model Checking One Million Lines of C Code.
NDSS 2004 |
66 | EE | David Wagner:
Resilient aggregation in sensor networks.
SASN 2004: 78-87 |
65 | EE | Chris Karlof,
Naveen Sastry,
David Wagner:
TinySec: a link layer security architecture for wireless sensor networks.
SenSys 2004: 162-175 |
64 | EE | Zhendong Su,
David Wagner:
A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings.
TACAS 2004: 280-295 |
63 | EE | Mark Johnson,
David Wagner,
Kannan Ramchandran:
On Compressing Encrypted Data without the Encryption Key.
TCC 2004: 491-504 |
62 | EE | Robert Johnson,
David Wagner:
Finding User/Kernel Pointer Bugs with Type Inference.
USENIX Security Symposium 2004: 119-134 |
61 | EE | Nathan Good,
David Molnar,
Jennifer M. Urban,
Deirdre K. Mulligan,
Elizabeth Miles,
Laura Quilter,
David Wagner:
Radio frequency Id and privacy with information goods.
WPES 2004: 41-42 |
60 | EE | Naveen Sastry,
David Wagner:
Security considerations for IEEE 802.15.4 networks.
Workshop on Wireless Security 2004: 32-42 |
59 | EE | David Jefferson,
Aviel D. Rubin,
Barbara Simons,
David Wagner:
Analyzing internet voting security.
Commun. ACM 47(10): 59-64 (2004) |
58 | EE | Adrian Perrig,
John A. Stankovic,
David Wagner:
Security in wireless sensor networks.
Commun. ACM 47(6): 53-57 (2004) |
2003 |
57 | EE | Chris Karlof,
David Wagner:
Hidden Markov Model Cryptoanalysis.
CHES 2003: 17-34 |
56 | EE | Yuval Ishai,
Amit Sahai,
David Wagner:
Private Circuits: Securing Hardware against Probing Attacks.
CRYPTO 2003: 463-481 |
55 | EE | David Wagner:
Cryptanalysis of an Algebraic Privacy Homomorphism.
ISC 2003: 234-239 |
54 | EE | Naveen Sastry,
Umesh Shankar,
David Wagner:
Secure verification of location claims.
Workshop on Wireless Security 2003: 1-10 |
53 | EE | Chris Karlof,
David Wagner:
Secure routing in wireless sensor networks: attacks and countermeasures.
Ad Hoc Networks 1(2-3): 293-315 (2003) |
52 | EE | Nancy Cam-Winget,
Russell Housley,
David Wagner,
Jesse Walker:
Security flaws in 802.11 data link protocols.
Commun. ACM 46(5): 35-39 (2003) |
2002 |
51 | EE | Hao Chen,
David Wagner:
MOPS: an infrastructure for examining security properties of software.
ACM Conference on Computer and Communications Security 2002: 235-244 |
50 | EE | David Wagner,
Paolo Soto:
Mimicry attacks on host-based intrusion detection systems.
ACM Conference on Computer and Communications Security 2002: 255-264 |
49 | EE | David Wagner:
A Generalized Birthday Problem.
CRYPTO 2002: 288-303 |
48 | EE | Moses Liskov,
Ronald L. Rivest,
David Wagner:
Tweakable Block Ciphers.
CRYPTO 2002: 31-46 |
47 | EE | Robert Johnson,
David Molnar,
Dawn Xiaodong Song,
David Wagner:
Homomorphic Signature Schemes.
CT-RSA 2002: 244-262 |
46 | EE | Lars R. Knudsen,
David Wagner:
Integral Cryptanalysis.
FSE 2002: 112-127 |
45 | EE | Nikita Borisov,
Monica Chew,
Robert Johnson,
David Wagner:
Multiplicative Differentials.
FSE 2002: 17-33 |
44 | | Will Ivancic,
David Wagner,
Aviel D. Rubin,
Paul Ratazzi,
James P. G. Sterbenz:
Securing Wireless and Mobile Networks - Is It Possible?
INFOCOM 2002 |
43 | EE | Dawson R. Engler,
Cynthia E. Irvine,
Trent Jaeger,
David Wagner:
Cool security trends.
SACMAT 2002: 53 |
42 | EE | Ben Reichardt,
David Wagner:
Markov Truncated Differential Cryptanalysis of Skipjack.
Selected Areas in Cryptography 2002: 110-128 |
41 | EE | Hao Chen,
David Wagner,
Drew Dean:
Setuid Demystified.
USENIX Security Symposium 2002: 171-190 |
2001 |
40 | EE | Andre Scedrov,
Ran Canetti,
Joshua D. Guttman,
David Wagner,
Michael Waidner:
Relating Cryptography and Cryptographic Protocols.
CSFW 2001: 111-114 |
39 | EE | Scott Crosby,
Ian Goldberg,
Robert Johnson,
Dawn Xiaodong Song,
David Wagner:
A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Digital Rights Management Workshop 2001: 192-200 |
38 | EE | David Wagner,
Drew Dean:
Intrusion Detection via Static Analysis.
IEEE Symposium on Security and Privacy 2001: 156- |
37 | EE | Nikita Borisov,
Ian Goldberg,
David Wagner:
Intercepting mobile communications: the insecurity of 802.11.
MOBICOM 2001: 180-189 |
36 | EE | David Wagner:
Static Analysis and Software Assurance.
SAS 2001: 431 |
35 | | Lars R. Knudsen,
David Wagner:
On the structure of Skipjack.
Discrete Applied Mathematics 111(1-2): 103-116 (2001) |
2000 |
34 | | Niels Ferguson,
Bruce Schneier,
David Wagner:
Security Weaknesses in a Randomized Stream Cipher.
ACISP 2000: 234-241 |
33 | | Bruce Schneier,
John Kelsey,
Doug Whiting,
David Wagner,
Niels Ferguson:
Comments on Twofish as an AES Candidate.
AES Candidate Conference 2000: 355-356 |
32 | EE | David Wagner:
Cryptanalysis of the Yi-Lam Hash.
ASIACRYPT 2000: 483-488 |
31 | EE | David Wagner,
Ian Goldberg:
Proofs of Security for the Unix Password Hashing Algorithm.
ASIACRYPT 2000: 560-572 |
30 | EE | Alex Biryukov,
David Wagner:
Advanced Slide Attacks.
EUROCRYPT 2000: 589-606 |
29 | EE | Alex Biryukov,
Adi Shamir,
David Wagner:
Real Time Cryptanalysis of A5/1 on a PC.
FSE 2000: 1-18 |
28 | EE | Niels Ferguson,
John Kelsey,
Stefan Lucks,
Bruce Schneier,
Michael Stay,
David Wagner,
Doug Whiting:
Improved Cryptanalysis of Rijndael.
FSE 2000: 213-230 |
27 | EE | Dawn Xiaodong Song,
David Wagner,
Adrian Perrig:
Practical Techniques for Searches on Encrypted Data.
IEEE Symposium on Security and Privacy 2000: 44-55 |
26 | EE | David Wagner,
Jeffrey S. Foster,
Eric A. Brewer,
Alexander Aiken:
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
NDSS 2000 |
25 | | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security 8(2/3): (2000) |
1999 |
24 | EE | Bruce Schneier,
Mudge,
David Wagner:
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2).
CQRE 1999: 192-203 |
23 | EE | Lars R. Knudsen,
Matthew J. B. Robshaw,
David Wagner:
Truncated Differentials and Skipjack.
CRYPTO 1999: 165-180 |
22 | EE | John Kelsey,
Bruce Schneier,
David Wagner:
Mod n Cryptanalysis, with Applications Against RC5P and M6.
FSE 1999: 139-155 |
21 | EE | David Wagner:
The Boomerang Attack.
FSE 1999: 156-170 |
20 | EE | Alex Biryukov,
David Wagner:
Slide Attacks.
FSE 1999: 245-259 |
19 | EE | Ian Goldberg,
Steven D. Gribble,
David Wagner,
Eric A. Brewer:
The Ninja Jukebox.
USENIX Symposium on Internet Technologies and Systems 1999 |
1998 |
18 | EE | Chris Hall,
David Wagner,
John Kelsey,
Bruce Schneier:
Building PRFs from PRPs.
CRYPTO 1998: 370-389 |
17 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
ESORICS 1998: 97-110 |
16 | EE | John Kelsey,
Bruce Schneier,
David Wagner,
Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators.
FSE 1998: 168-188 |
15 | EE | David Wagner:
Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation.
FSE 1998: 254-269 |
14 | EE | David Wagner:
Differential Cryptanalysis of KHF.
FSE 1998: 293-296 |
13 | EE | Don Coppersmith,
David Wagner,
Bruce Schneier,
John Kelsey:
Cryptanalysis of TWOPRIME.
FSE 1998: 32-48 |
12 | EE | Chris Hall,
John Kelsey,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Financial Cryptography 1998: 309-310 |
11 | EE | Bruce Schneier,
John Kelsey,
Doug Whiting,
David Wagner,
Chris Hall:
On the Twofish Key Schedule.
Selected Areas in Cryptography 1998: 27-42 |
10 | EE | David Wagner,
Leone Simpson,
Ed Dawson,
John Kelsey,
William Millan,
Bruce Schneier:
Cryptanalysis of ORYX.
Selected Areas in Cryptography 1998: 296-305 |
9 | EE | Chris Hall,
John Kelsey,
Vincent Rijmen,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Selected Areas in Cryptography 1998: 319-338 |
8 | EE | Ian Goldberg,
David Wagner:
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web.
First Monday 3(4): (1998) |
1997 |
7 | EE | David Wagner,
Bruce Schneier,
John Kelsey:
Cryptoanalysis of the Cellular Encryption Algorithm.
CRYPTO 1997: 526-537 |
6 | | John Kelsey,
Bruce Schneier,
David Wagner:
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
ICICS 1997: 233-246 |
5 | | John Kelsey,
Bruce Schneier,
Chris Hall,
David Wagner:
Secure Applications of Low-Entropy Keys.
ISW 1997: 121-134 |
4 | | John Kelsey,
Bruce Schneier,
David Wagner:
Protocol Interactions and the Chosen Protocol Attack.
Security Protocols Workshop 1997: 91-104 |
1996 |
3 | EE | John Kelsey,
Bruce Schneier,
David Wagner:
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
CRYPTO 1996: 237-251 |
1993 |
2 | | Dirk Grunwald,
Gary J. Nutt,
Anthony M. Sloane,
David Wagner,
Benjamin G. Zorn:
A Testbed for Studying Parallel Programs and Parallel Execution Architectures.
MASCOTS 1993: 95-106 |
1989 |
1 | EE | Brian Alspach,
Paul J. Schellenberg,
Douglas R. Stinson,
David Wagner:
The Oberwolfach problem and factors of uniform odd length cycles.
J. Comb. Theory, Ser. A 52(1): 20-43 (1989) |