Faculty Publications - David Wagner

Books

  • B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm: A 128-Bit Block Cipher, New York: J. Wiley, 1999. [abstract]
  • D. L. Oppenheimer, D. Wagner, and M. D. Crabb, System Security: A Management Perspective, Short Topics in System Administration, Vol. 3, Berkeley, CA: USENIX Association, 1997. [abstract]

Book chapters or sections

  • N. T. Courtois, G. V. Bard, and D. Wagner, "Algebraic and slide attacks on KeeLoq," in Fast Software Encryption: Proc. 15th Intl. Workshop (FSE 2008). Revised Selected Papers, K. Nyberg, Ed., Lecture Notes in Computer Science, Vol. 5086, Berlin, Germany: Springer-Verlag, 2008, pp. 97-115.
  • N. Hopper, D. Molnar, and D. Wagner, "From weak to strong watermarking," in Theory of Cryptography: Proc. 4th Conf. (TCC 2007), S. P. Vadhan, Ed., Lecture Notes in Computer Science, Vol. 4392, Berlin, Germany: Springer-Verlag, 2007, pp. 362-382.
  • M. Johnson, D. Wagner, and K. Ramchandran, "On compressing encrypted data without the encryption key," in Theory of Cryptography: Proc. 1st Theory of Cryptograpy Conf. (TSS 2004), M. Naor, Ed., Lecture Notes in Computer Science, Vol. 2951, Berlin, Germany: Springer-Verlag, 2004, pp. 491-504.
  • R. Johnson, D. Molnar, D. Song, and D. Wagner, "Homomorphic signature schemes," in Topics in Cryptography: The Cryptographer's Track at the RSA Conf. (CT-RSA 2002), B. Preneel, Ed., Lecture Notes in Computer Science, Vol. 2271, Berlin, Germany: Springer-Verlag, 2002, pp. 244-262.

Articles in journals or magazines

Articles in conference proceedings

Technical Reports

Unpublished articles

Masters Reports

Miscellaneous