David A. Wagner

Orcid: 0000-0002-9944-9232

Affiliations:
  • University of California, Berkeley, CA, USA


According to our database1, David A. Wagner authored at least 225 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Vulnerability Detection with Code Language Models: How Far Are We?
CoRR, 2024

Generative AI Security: Challenges and Countermeasures.
CoRR, 2024

PAL: Proxy-Guided Black-Box Attack on Large Language Models.
CoRR, 2024

StruQ: Defending Against Prompt Injection with Structured Queries.
CoRR, 2024

2023
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN.
IEEE Syst. J., June, 2023

Jatmo: Prompt Injection Defense by Task-Specific Finetuning.
CoRR, 2023

Mark My Words: Analyzing and Evaluating Language Model Watermarks.
CoRR, 2023

Can LLMs Follow Simple Rules?
CoRR, 2023

Defending Against Transfer Attacks From Public Models.
CoRR, 2023

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection.
CoRR, 2023

Network Detection of Interactive SSH Impostors Using Deep Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Continuous Learning for Android Malware Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Part-Based Models Improve Adversarial Robustness.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

REAP: A Large-Scale Realistic Adversarial Patch Benchmark.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives.
Proc. ACM Hum. Comput. Interact., 2022

Runtime Permissions for Privacy in Proactive Intelligent Assistants.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Demystifying the Adversarial Robustness of Random Transformation Defenses.
Proceedings of the International Conference on Machine Learning, 2022

SLIP: Self-supervision Meets Language-Image Pre-training.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Hopper: Modeling and Detecting Lateral Movement (Extended Report).
CoRR, 2021

Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks.
CoRR, 2021

Model-Agnostic Defense for Lane Detection against Adversarial Attack.
CoRR, 2021

Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium, 2021

Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

Learning Security Classifiers with Verified Global Robustness Properties.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts.
CoRR, 2020

Improving Adversarial Robustness Through Progressive Hardening.
CoRR, 2020

Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Minimum-Norm Adversarial Examples on KNN and KNN based Models.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

Minority Reports Defense: Defending Against Adversarial Patches.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Privacy Attitudes of Smart Speaker Users.
Proc. Priv. Enhancing Technol., 2019

Stateful Detection of Black-Box Adversarial Attacks.
CoRR, 2019

Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of the 28th USENIX Security Symposium, 2019

On the Robustness of Deep K-Nearest Neighbors.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Privacy controls for always-listening devices.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

2018
Dynamically Regulating Mobile Application Permissions.
IEEE Secur. Priv., 2018

Inferring Phone Location State.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Background Class Defense Against Adversarial Examples.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Audio Adversarial Examples: Targeted Attacks on Speech-to-Text.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples.
Proceedings of the 35th International Conference on Machine Learning, 2018

Adversarially Robust Malware Detection Using Monotonic Classification.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

Contextualizing Privacy Decisions for Better Prediction (and Protection).
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
A Usability Evaluation of Tor Launcher.
Proc. Priv. Enhancing Technol., 2017

MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples.
CoRR, 2017

Detecting Credential Spearphishing in Enterprise Settings.
Proceedings of the 26th USENIX Security Symposium, 2017

Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers.
Proceedings of the 26th USENIX Security Symposium, 2017

The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Towards Evaluating the Robustness of Neural Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

A Large-Scale Study of Modern Code Review and Security in Open Source Projects.
Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering, 2017

Breaking active-set backward-edge CFI.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Security and Machine Learning.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Spoofing 2D Face Detection: Machines See People Who Aren't There.
CoRR, 2016

Defensive Distillation is Not Robust to Adversarial Examples.
CoRR, 2016

Fairness and the coin flip: technical perspective.
Commun. ACM, 2016

Hidden Voice Commands.
Proceedings of the 25th USENIX Security Symposium, 2016

Recovering High-Value Secrets with SGX and Social Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Securing Recognizers for Rich Video Applications.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

Smart Locks: Lessons for Securing Commodity Internet of Things Devices.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Attestation Transparency: Building secure Internet services for legacy clients.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Risk Perceptions for Wearable Devices.
CoRR, 2015

Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium, 2015

Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.
Proceedings of the 24th USENIX Security Symposium, 2015

Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

The Performance Cost of Shadow Stacks and Stack Canaries.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
ROP is Still Dangerous: Breaking Modern Defenses.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

The effect of developer-specified explanations for permission requests on smartphone user behavior.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Are You Ready to Lock?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Developing Social Capital in Online Communities: The Challenge of Fluidity.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Bifocals: Analyzing WebView Vulnerabilities in Android Applications.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Improved Support for Machine-assisted Ballot-level Audits.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

An Empirical Study of Vulnerability Rewards Programs.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Symbolic software model validation.
Proceedings of the 11th ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2013

An Empirical Study on the Effectiveness of Security Code Review.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

Do Android users write about electric sheep? Examining consumer reviews in Google Play.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

Choice Architecture and Smartphone Privacy: There's a Price for That.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Evidence-Based Elections.
IEEE Secur. Priv., 2012

Choice Architecture and Smartphone Privacy: There's a Price for That.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Operator-Assisted Tabulation of Optical Scan Ballots.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

How to Ask for Permission.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

An Evaluation of the Google Chrome Extension Security Architecture.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Automated Analysis of Election Audit Logs.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Android permissions: user attention, comprehension, and behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Measuring user confidence in smartphone security and privacy.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Verification with small and short worlds.
Proceedings of the Formal Methods in Computer-Aided Design, 2012

AdDroid: privilege separation for applications and advertisers in Android.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Reducing attack surfaces for intra-application communication in android.
Proceedings of the SPSM'12, 2012

Short paper: location privacy: user behavior in the field.
Proceedings of the SPSM'12, 2012

I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns.
Proceedings of the SPSM'12, 2012

2011
Tweakable Block Ciphers.
J. Cryptol., 2011

The Effectiveness of Application Permissions.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

An Analysis of Write-in Marks on Optical Scan Ballots.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

Defeating UCI: Building Stealthy and Malicious Hardware.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Analyzing inter-application communication in Android.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Diesel: applying privilege separation to database access.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

A survey of mobile malware in the wild.
Proceedings of the SPSM'11, 2011

Android permissions demystified.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Fine-grained privilege separation for web applications.
Proceedings of the 19th International Conference on World Wide Web, 2010

Efficient User-Guided Ballot Image Verification.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

Class properties for security review in an object-capability subset of Java: (short paper).
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010

Joe-E: A Security-Oriented Subset of Java.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
A graph approach to quantitative analysis of control-flow obfuscating transformations.
IEEE Trans. Inf. Forensics Secur., 2009

Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.
Proceedings of the 18th USENIX Security Symposium, 2009

Efficient character-level taint tracking for Java.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2009

On voting machine design for verification and testability.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
The Murky Issue of Changing Process Identity: Revising "Setuid Demystified".
login Usenix Mag., 2008

Portably solving file races with hardness amplification.
ACM Trans. Storage, 2008

You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Replayable Voting Machine Audit Logs.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

A User Study Design for Comparing the Security of Registration Protocols.
Proceedings of the Usability, Psychology, and Security, 2008

Portably Solving File TOCTTOU Races with Hardness Amplification.
Proceedings of the 6th USENIX Conference on File and Storage Technologies, 2008

Verifiable functional purity in java.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Algebraic and Slide Attacks on KeeLoq.
IACR Cryptol. ePrint Arch., 2007

Risks of e-voting.
Commun. ACM, 2007

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract).
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Large-scale analysis of format string vulnerabilities in Debian Linux.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

Dynamic pharming attacks and locked same-origin policies for web browsers.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine.
IACR Cryptol. ePrint Arch., 2006

From Weak to Strong Watermarking.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis of a Cognitive Authentication Scheme.
IACR Cryptol. ePrint Arch., 2006

Security considerations for incremental hash functions based on pair block chaining.
Comput. Secur., 2006

Prerendered User Interfaces for Higher-Assurance Electronic Voting.
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Object capabilities for security.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications.
Proceedings of IEEE International Conference on Communications, 2006

Private Circuits II: Keeping Secrets in Tamperable Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Cryptographic Protocols for Electronic Voting.
Proceedings of the Advances in Cryptology, 2006

2005
A class of polynomially solvable range constraints for interval analysis without widenings.
Theor. Comput. Sci., 2005

A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
IACR Cryptol. ePrint Arch., 2005

The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2005

Security and Privacy Issues in E-passports.
IACR Cryptol. ePrint Arch., 2005

Generic On-Line/Off-Line Threshold Signatures.
IACR Cryptol. ePrint Arch., 2005

Privacy for RFID through trusted computing.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Cryptographic Voting Protocols: A Systems Perspective.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Pushdown Model Checking for Security.
Proceedings of the Model Checking Software, 2005

An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Towards a privacy measurement criterion for voting systems.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Fault Attacks on Dual-Rail Encoded Systems.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Model Checking An Entire Linux Distribution for Security Violations.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Security in wireless sensor networks.
Commun. ACM, 2004

Analyzing internet voting security.
Commun. ACM, 2004

Security considerations for IEEE 802.15.4 networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Radio frequency Id and privacy with information goods.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Finding User/Kernel Pointer Bugs with Type Inference.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

On Compressing Encrypted Data without the Encryption Key.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2004

TinySec: a link layer security architecture for wireless sensor networks.
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004

Resilient aggregation in sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Model Checking One Million Lines of C Code.
Proceedings of the Network and Distributed System Security Symposium, 2004

Towards a Unifying View of Block Cipher Cryptanalysis.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

The EAX Mode of Operation.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Towards Efficient Second-Order Power Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

Cryptanalysis of a provably secure CRT-RSA algorithm.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Privacy and security in library RFID: issues, practices, and architectures.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
A Security Evaluation of Whitenoise.
IACR Cryptol. ePrint Arch., 2003

A Critique of CCM.
IACR Cryptol. ePrint Arch., 2003

EAX: A Conventional Authenticated-Encryption Mode.
IACR Cryptol. ePrint Arch., 2003

Security flaws in 802.11 data link protocols.
Commun. ACM, 2003

Secure routing in wireless sensor networks: attacks and countermeasures.
Ad Hoc Networks, 2003

Secure verification of location claims.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Cryptanalysis of an Algebraic Privacy Homomorphism.
Proceedings of the Information Security, 6th International Conference, 2003

Private Circuits: Securing Hardware against Probing Attacks.
Proceedings of the Advances in Cryptology, 2003

Hidden Markov Model Cryptanalysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
Setuid Demystified.
Proceedings of the 11th USENIX Security Symposium, 2002

Markov Truncated Differential Cryptanalysis of Skipjack.
Proceedings of the Selected Areas in Cryptography, 2002

Cool security trends.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Securing Wireless and Mobile Networks - Is It Possible?
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Insecurity in ATM-based passive optical networks.
Proceedings of the IEEE International Conference on Communications, 2002

Integral Cryptanalysis.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Multiplicative Differentials.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Homomorphic Signature Schemes.
Proceedings of the Topics in Cryptology, 2002

A Generalized Birthday Problem.
Proceedings of the Advances in Cryptology, 2002

Mimicry attacks on host-based intrusion detection systems.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

MOPS: an infrastructure for examining security properties of software.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
On the structure of Skipjack.
Discret. Appl. Math., 2001

Timing Analysis of Keystrokes and Timing Attacks on SSH.
Proceedings of the 10th USENIX Security Symposium, 2001

Detecting Format String Vulnerabilities with Type Qualifiers.
Proceedings of the 10th USENIX Security Symposium, 2001

Intrusion Detection via Static Analysis.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Static Analysis and Software Assurance.
Proceedings of the Static Analysis, 8th International Symposium, 2001

Intercepting mobile communications: the insecurity of 802.11.
Proceedings of the MOBICOM 2001, 2001

Relating Cryptography and Cryptographic Protocols.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
Side Channel Cryptanalysis of Product Ciphers.
J. Comput. Secur., 2000

Practical Techniques for Searches on Encrypted Data.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2000

Improved Cryptanalysis of Rijndael.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Real Time Cryptanalysis of A5/1 on a PC.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Advanced Slide Attacks.
Proceedings of the Advances in Cryptology, 2000

Proofs of Security for the Unix Password Hashing Algorithm.
Proceedings of the Advances in Cryptology, 2000

Cryptanalysis of the Yi-Lam Hash.
Proceedings of the Advances in Cryptology, 2000

Comments on Twofish as an AES Candidate.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

Security Weaknesses in a Randomized Stream Cipher.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
The Ninja Jukebox.
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999

The Boomerang Attack.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Mod n Cryptanalysis, with Applications Against RC5P and M6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Slide Attacks.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Truncated Differentials and Skipjack.
Proceedings of the Advances in Cryptology, 1999

Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2).
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web.
First Monday, 1998

Cryptanalysis of ORYX.
Proceedings of the Selected Areas in Cryptography '98, 1998

On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998

Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998

Differential Cryptanalysis of KHF.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of TWOPRIME.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998

Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998

1997
Protocol Interactions and the Chosen Protocol Attack.
Proceedings of the Security Protocols, 1997

Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997

Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
Proceedings of the Information and Communication Security, First International Conference, 1997

Cryptanalysis of the Cellular Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1997

Privacy-enhancing technologies for the Internet.
Proceedings of the Proceedings IEEE COMPCON 97, 1997

1996
KD trees and Delaunay-based linear interpolation for function learning: a comparison to neural networks with error backpropagation.
IEEE Trans. Control. Syst. Technol., 1996

A Secure Environment for Untrusted Helper Applications.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996

A "bump in the stack" encryptor for MS-DOS systems.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
Proceedings of the Advances in Cryptology, 1996

1993
A Testbed for Studying Parallel Programs and Parallel Execution Architectures.
Proceedings of the MASCOTS '93, 1993


  Loading...