The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael J. Wiener: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Erik De Win, Serge Mister, Bart Preneel, Michael J. Wiener
    On the Performance of Signature Schemes Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ANTS, 1998, pp:252-266 [Conf]
  2. Warwick Ford, Michael J. Wiener
    A Key Distribution Method for Object-Based Protection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:193-197 [Conf]
  3. Paul C. van Oorschot, Michael J. Wiener
    Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:210-218 [Conf]
  4. Keith W. Campbell, Michael J. Wiener
    DES is not a Group. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:512-520 [Conf]
  5. Paul C. van Oorschot, Michael J. Wiener
    Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:229-236 [Conf]
  6. D. G. Steer, L. Strawczynski, Whitfield Diffie, Michael J. Wiener
    A Secure Audio Teleconference System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:520-528 [Conf]
  7. Paul C. van Oorschot, Michael J. Wiener
    A Known Plaintext Attack on Two-Key Triple Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:318-325 [Conf]
  8. Paul C. van Oorschot, Michael J. Wiener
    On Diffie-Hellman Key Agreement with Short Exponents. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:332-343 [Conf]
  9. Michael J. Wiener
    Cryptanalysis of Short RSA Secret Exponents (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:372- [Conf]
  10. Michael J. Wiener, Robert J. Zuccherato
    Faster Attacks on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:190-200 [Conf]
  11. Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener
    Authentication and Authenticated Key Exchanges. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:2, pp:107-125 [Journal]
  12. Paul C. van Oorschot, Michael J. Wiener
    Parallel Collision Search with Cryptanalytic Applications. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:1, pp:1-28 [Journal]
  13. Michael J. Wiener
    The Full Cost of Cryptanalytic Attacks. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2004, v:17, n:2, pp:105-124 [Journal]
  14. Michael J. Wiener
    Cryptanalysis of short RSA secret exponents. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:553-558 [Journal]

Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002