Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
David Wagner
Search web for home page
Program Committees
1
2008
Crypto
pc chair
2
2004
Crypto
pc
3
2003
FSE
pc
4
2001
Eurocrypt
pc
5
2000
Crypto
pc
Publications
year
title
booktitle
pages
1
2011
Tweakable Block Ciphers
jofc
588-613
2
2008
Algebraic and Slide Attacks on KeeLoq
fse
97-115
3
2007
Algebraic and Slide Attacks on KeeLoq
eprint
online
4
2007
From Weak to Strong Watermarking
tcc
362-382
5
2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
eprint
online
6
2006
Cryptographic Protocols for Electronic Voting
crypto
online
7
2006
Generic On-Line/Off-Line Threshold Signatures
pkc
online
8
2006
From Weak to Strong Watermarking
eprint
online
9
2006
Private Circuits II: Keeping Secrets in Tamperable Circuits
eurocrypt
online
10
2006
Cryptanalysis of a Cognitive Authentication Scheme
eprint
online
11
2005
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
eprint
online
12
2005
Security and Privacy Issues in E-passports
eprint
online
13
2005
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
eprint
online
14
2005
Generic On-Line/Off-Line Threshold Signatures
eprint
online
15
2004
Towards Efficient Second-Order Power Analysis
ches
1-15
16
2004
On Compressing Encrypted Data without the Encryption Key
tcc
491-504
17
2004
Towards a Unifying View of Block Cipher Cryptanalysis
fse
16-33
18
2004
The EAX Mode of Operation
fse
389-407
19
2003
EAX: A Conventional Authenticated-Encryption Mode
eprint
online
20
2003
A Critique of CCM
eprint
online
21
2003
Private Circuits: Securing Hardware against Probing Attacks
crypto
online
22
2003
A Security Evaluation of Whitenoise
eprint
online
23
2003
Hidden Markov Model Cryptoanalysis
ches
17-34
24
2002
A Generalized Birthday Problem
crypto
online
25
2002
Integral Cryptanalysis
fse
online
26
2002
Tweakable Block Ciphers
crypto
online
27
2002
Multiplicative Differentials
fse
online
28
2000
Advanced Slide Attacks
eurocrypt
589-606
29
2000
Cryptanalysis of the Yi-Lam Hash
asiacrypt
483-488
30
2000
Proofs of Security for the Unix Password Hashing Algorithm
asiacrypt
560-572
31
2000
Improved Cryptanalysis of Rijndael
fse
213-230
32
2000
Real Time Cryptanalysis of A5/1 on a PC
fse
1-18
33
1999
Mod n Cryptanalysis, with Applications Against RC5P and M6
fse
139-155
34
1999
The Boomerang Attack
fse
156-170
35
1999
Truncated Differentials and Skipjack
crypto
165-180
36
1999
Slide Attacks
fse
245-259
37
1998
Cryptanalytic Attacks on Pseudorandom Number Generators
fse
168-188
38
1998
Building PRFs from PRPs
crypto
370-389
39
1998
Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation
fse
254-269
40
1998
Differential Cryptanalysis of KHF
fse
293-296
41
1998
Cryptanalysis of TWOPRIME
fse
32-48
42
1997
Cryptoanalysis of the Cellular Encryption Algorithm
crypto
526-537
43
1996
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
crypto
237-251
Coauthors of David Wagner
Gregory V. Bard
Mihir Bellare
Alex Biryukov
Nikita Borisov
Monica Chew
Don Coppersmith
Nicolas Courtois
Chris Crutchfield
Niels Ferguson
Ian Goldberg
Philippe Golle
Chris Hall
Nicholas J. Hopper
Yuval Ishai
Robert Johnson
Mark Johnson
Ari Juels
Chris Karlof
John Kelsey
Lars R. Knudsen
Tadayoshi Kohno
Moses Liskov
Stefan Lucks
David Molnar
Matt Piotrowski
Manoj Prabhakaran
Kannan Ramchandran
Ronald L. Rivest
Matthew J. B. Robshaw
Phillip Rogaway
Amit Sahai
Naveen Sastry
Bruce Schneier
David Schultz
Adi Shamir
Andrea Soppera
Michael Stay
David Turner
Jason Waddle
Doug Whiting