dblp.uni-trier.dewww.uni-trier.de

Michael J. Wiener

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
16 Carlisle M. Adams, Ali Miri, Michael J. Wiener: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers Springer 2007
2004
15EEMichael J. Wiener: The Full Cost of Cryptanalytic Attacks. J. Cryptology 17(2): 105-124 (2004)
1999
14 Michael J. Wiener: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings Springer 1999
13EEPaul C. van Oorschot, Michael J. Wiener: Parallel Collision Search with Cryptanalytic Applications. J. Cryptology 12(1): 1-28 (1999)
1998
12EEErik De Win, Serge Mister, Bart Preneel, Michael J. Wiener: On the Performance of Signature Schemes Based on Elliptic Curves. ANTS 1998: 252-266
11EEMichael J. Wiener, Robert J. Zuccherato: Faster Attacks on Elliptic Curve Cryptosystems. Selected Areas in Cryptography 1998: 190-200
1996
10EEPaul C. van Oorschot, Michael J. Wiener: Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. CRYPTO 1996: 229-236
9EEPaul C. van Oorschot, Michael J. Wiener: On Diffie-Hellman Key Agreement with Short Exponents. EUROCRYPT 1996: 332-343
1994
8EEWarwick Ford, Michael J. Wiener: A Key Distribution Method for Object-Based Protection. ACM Conference on Computer and Communications Security 1994: 193-197
7EEPaul C. van Oorschot, Michael J. Wiener: Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. ACM Conference on Computer and Communications Security 1994: 210-218
1992
6EEKeith W. Campbell, Michael J. Wiener: DES is not a Group. CRYPTO 1992: 512-520
5 Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener: Authentication and Authenticated Key Exchanges. Des. Codes Cryptography 2(2): 107-125 (1992)
1990
4EEPaul C. van Oorschot, Michael J. Wiener: A Known Plaintext Attack on Two-Key Triple Encryption. EUROCRYPT 1990: 318-325
3 Michael J. Wiener: Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory 36(3): 553-558 (1990)
1989
2EEMichael J. Wiener: Cryptanalysis of Short RSA Secret Exponents (Abstract). EUROCRYPT 1989: 372
1988
1EED. G. Steer, L. Strawczynski, Whitfield Diffie, Michael J. Wiener: A Secure Audio Teleconference System. CRYPTO 1988: 520-528

Coauthor Index

1Carlisle M. Adams (Carlisle Adams) [16]
2Keith W. Campbell [6]
3Whitfield Diffie [1] [5]
4Warwick Ford [8]
5Ali Miri [16]
6Serge Mister [12]
7Paul C. van Oorschot [4] [5] [7] [9] [10] [13]
8Bart Preneel [12]
9D. G. Steer [1]
10L. Strawczynski [1]
11Erik De Win [12]
12Robert J. Zuccherato [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)