Cryptographers' World
 

David Wagner


Author's Web Page Link

38 papers in database with 2621 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 23

Conference Proceedings

 
1. David Wagner, editor, Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-85173-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Nicolas Courtois,  Gregory V. Bard,  David Wagner,  Algebraic and Slide Attacks on KeeLoq, pp. 97 - 115, FSE 2008.

[Electronic Edition][Cited 59 times Red Star]

2. Nicholas J. Hopper,  David Molnar,  David Wagner,  From Weak to Strong Watermarking, pp. 362 - 382, TCC 2007.

[Electronic Edition][Cited 8 times ]

3. Yuval Ishai,  Manoj Prabhakaran,  Amit Sahai,  David Wagner,  Private Circuits II: Keeping Secrets in Tamperable Circuits, pp. 308 - 327, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 26 times ]

4. Christopher Y. Crutchfield,  David Molnar,  David Turner,  David Wagner,  Generic On-Line/Off-Line Threshold Signatures, pp. 58 - 74, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 13 times ]

5. David Wagner,  Cryptographic Protocols for Electronic Voting, pp. 393 - 393, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

6. David Molnar,  Andrea Soppera,  David Wagner,  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags, pp. 276 - 290, SAC 2005.

[Electronic Edition][Cited 165 times Red StarRed Star]

7. Jason Waddle,  David Wagner,  Towards Efficient Second-Order Power Analysis, pp. 1 - 15, CHES 2004.

[Electronic Edition][Cited 90 times Red Star]

8. Mihir Bellare,  Phillip Rogaway,  David Wagner,  The EAX Mode of Operation, pp. 389 - 407, FSE 2004.

[Electronic Edition][Cited 81 times Red Star]

9. David Wagner,  Towards a Unifying View of Block Cipher Cryptanalysis, pp. 16 - 33, FSE 2004.

[Electronic Edition][Cited 21 times ]

10. Mark Johnson,  David Wagner,  Kannan Ramchandran,  On Compressing Encrypted Data without the Encryption Key, pp. 491 - 504, TCC 2004.

[Electronic Edition][Cited 2 times ]

11. Chris Karlof,  David Wagner,  Hidden Markov Model Cryptanalysis, pp. 17 - 34, CHES 2003.

[Electronic Edition][Cited 41 times ]

12. Yuval Ishai,  Amit Sahai,  David Wagner,  Private Circuits: Securing Hardware against Probing Attacks, pp. 463 - 481, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 84 times Red Star]

13. Ben Reichardt,  David Wagner,  Markov Truncated Differential Cryptanalysis of Skipjack, pp. 110 - 128, SAC 2002.

[Electronic Edition][Cited 4 times ]

14. Moses Liskov,  Ronald L. Rivest,  David Wagner,  Tweakable Block Ciphers, pp. 31 - 46, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 155 times Red StarRed Star]

15. David Wagner,  A Generalized Birthday Problem, pp. 288 - 303, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 161 times Red StarRed Star]

16. Robert Johnson,  David Molnar,  Dawn Xiaodong Song,  David Wagner,  Homomorphic Signature Schemes, pp. 244 - 262, CT-RSA 2002.

[Electronic Edition][Cited 107 times Red StarRed Star]

17. Lars R. Knudsen,  David Wagner,  Integral Cryptanalysis, pp. 112 - 127, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 122 times Red StarRed Star]

18. Nikita Borisov,  Monica Chew,  Robert Johnson,  David Wagner,  Multiplicative Differentials, pp. 17 - 33, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

19. David Wagner,  Ian Goldberg,  Proofs of Security for the Unix Password Hashing Algorithm, pp. 560 - 572, ASIACRYPT 2000.

[Electronic Edition][Cited 9 times ]

20. David Wagner,  Cryptanalysis of the Yi-Lam Hash, pp. 483 - 488, ASIACRYPT 2000.

[Electronic Edition][Cited 2 times ]

21. Alex Biryukov,  David Wagner,  Advanced Slide Attacks, pp. 589 - 606, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 117 times Red StarRed Star]

22. Alex Biryukov,  Adi Shamir,  David Wagner,  Real Time Cryptanalysis of A5/1 on a PC, pp. 1 - 18, FSE 2000.

[Electronic Edition][Cited 254 times Red StarRed StarRed Star]

23. Niels Ferguson,  John Kelsey,  Stefan Lucks,  Bruce Schneier,  Michael Stay,  David Wagner,  Doug Whiting,  Improved Cryptanalysis of Rijndael, pp. 213 - 230, FSE 2000.

[Electronic Edition][Cited 206 times Red StarRed Star]

24. Lars R. Knudsen,  Matthew J. B. Robshaw,  David Wagner,  Truncated Differentials and Skipjack, pp. 165 - 180, CRYPTO 1999.

[Electronic Edition][Cited 30 times ]

25. David Wagner,  The Boomerang Attack, pp. 156 - 170, FSE 1999.

[Electronic Edition][Cited 212 times Red StarRed Star]

26. John Kelsey,  Bruce Schneier,  David Wagner,  Mod n Cryptanalysis, with Applications Against RC5P and M6, pp. 139 - 155, FSE 1999.

[Electronic Edition][Cited 56 times Red Star]

27. Alex Biryukov,  David Wagner,  Slide Attacks, pp. 245 - 259, FSE 1999.

[Electronic Edition][Cited 177 times Red StarRed Star]

28. David Wagner,  Leone Simpson,  Ed Dawson,  John Kelsey,  William Millan,  Bruce Schneier,  Cryptanalysis of ORYX, pp. 296 - 305, SAC 1998.

[Electronic Edition][Cited 24 times ]

29. Bruce Schneier,  John Kelsey,  Doug Whiting,  David Wagner,  Chris Hall,  On the Twofish Key Schedule, pp. 27 - 42, SAC 1998.

[Electronic Edition][Cited 16 times ]

30. Chris Hall,  John Kelsey,  Vincent Rijmen,  Bruce Schneier,  David Wagner,  Cryptanalysis of SPEED, pp. 319 - 338, SAC 1998.

[Electronic Edition][Cited 4 times ]

31. Chris Hall,  David Wagner,  John Kelsey,  Bruce Schneier,  Building PRFs from PRPs, pp. 370 - 389, CRYPTO 1998.

[Electronic Edition][Cited 33 times ]

32. Don Coppersmith,  David Wagner,  Bruce Schneier,  John Kelsey,  Cryptanalysis of TWOPRIME, pp. 32 - 48, FSE 1998.

[Electronic Edition][Cited 7 times ]

33. David Wagner,  Differential Cryptanalysis of KHF, pp. 293 - 296, FSE 1998.

[Electronic Edition][Cited 2 times ]

34. David Wagner,  Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation, pp. 254 - 269, FSE 1998.

[Electronic Edition][Cited 16 times ]

35. John Kelsey,  Bruce Schneier,  David Wagner,  Chris Hall,  Cryptanalytic Attacks on Pseudorandom Number Generators, pp. 168 - 188, FSE 1998.

[Electronic Edition][Cited 97 times Red Star]

36. Chris Hall,  John Kelsey,  Bruce Schneier,  David Wagner,  Cryptanalysis of SPEED, pp. 309 - 310, FC 1998.

[Electronic Edition][Cited 4 times ]

37. David Wagner,  Bruce Schneier,  John Kelsey,  Cryptanalysis of the Cellular Message Encryption Algorithm, pp. 526 - 537, CRYPTO 1997.

[Electronic Edition][Cited 30 times ]

38. John Kelsey,  Bruce Schneier,  David Wagner,  Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, pp. 237 - 251, CRYPTO 1996.

[Electronic Edition][Cited 176 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...