2007 |
16 | | Carlisle M. Adams,
Ali Miri,
Michael J. Wiener:
Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
Springer 2007 |
2004 |
15 | EE | Michael J. Wiener:
The Full Cost of Cryptanalytic Attacks.
J. Cryptology 17(2): 105-124 (2004) |
1999 |
14 | | Michael J. Wiener:
Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings
Springer 1999 |
13 | EE | Paul C. van Oorschot,
Michael J. Wiener:
Parallel Collision Search with Cryptanalytic Applications.
J. Cryptology 12(1): 1-28 (1999) |
1998 |
12 | EE | Erik De Win,
Serge Mister,
Bart Preneel,
Michael J. Wiener:
On the Performance of Signature Schemes Based on Elliptic Curves.
ANTS 1998: 252-266 |
11 | EE | Michael J. Wiener,
Robert J. Zuccherato:
Faster Attacks on Elliptic Curve Cryptosystems.
Selected Areas in Cryptography 1998: 190-200 |
1996 |
10 | EE | Paul C. van Oorschot,
Michael J. Wiener:
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude.
CRYPTO 1996: 229-236 |
9 | EE | Paul C. van Oorschot,
Michael J. Wiener:
On Diffie-Hellman Key Agreement with Short Exponents.
EUROCRYPT 1996: 332-343 |
1994 |
8 | EE | Warwick Ford,
Michael J. Wiener:
A Key Distribution Method for Object-Based Protection.
ACM Conference on Computer and Communications Security 1994: 193-197 |
7 | EE | Paul C. van Oorschot,
Michael J. Wiener:
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
ACM Conference on Computer and Communications Security 1994: 210-218 |
1992 |
6 | EE | Keith W. Campbell,
Michael J. Wiener:
DES is not a Group.
CRYPTO 1992: 512-520 |
5 | | Whitfield Diffie,
Paul C. van Oorschot,
Michael J. Wiener:
Authentication and Authenticated Key Exchanges.
Des. Codes Cryptography 2(2): 107-125 (1992) |
1990 |
4 | EE | Paul C. van Oorschot,
Michael J. Wiener:
A Known Plaintext Attack on Two-Key Triple Encryption.
EUROCRYPT 1990: 318-325 |
3 | | Michael J. Wiener:
Cryptanalysis of short RSA secret exponents.
IEEE Transactions on Information Theory 36(3): 553-558 (1990) |
1989 |
2 | EE | Michael J. Wiener:
Cryptanalysis of Short RSA Secret Exponents (Abstract).
EUROCRYPT 1989: 372 |
1988 |
1 | EE | D. G. Steer,
L. Strawczynski,
Whitfield Diffie,
Michael J. Wiener:
A Secure Audio Teleconference System.
CRYPTO 1988: 520-528 |