Search the dblp DataBase
Michael J. Wiener :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Erik De Win , Serge Mister , Bart Preneel , Michael J. Wiener On the Performance of Signature Schemes Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] ANTS, 1998, pp:252-266 [Conf ] Warwick Ford , Michael J. Wiener A Key Distribution Method for Object-Based Protection. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:193-197 [Conf ] Paul C. van Oorschot , Michael J. Wiener Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:210-218 [Conf ] Keith W. Campbell , Michael J. Wiener DES is not a Group. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:512-520 [Conf ] Paul C. van Oorschot , Michael J. Wiener Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:229-236 [Conf ] D. G. Steer , L. Strawczynski , Whitfield Diffie , Michael J. Wiener A Secure Audio Teleconference System. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:520-528 [Conf ] Paul C. van Oorschot , Michael J. Wiener A Known Plaintext Attack on Two-Key Triple Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:318-325 [Conf ] Paul C. van Oorschot , Michael J. Wiener On Diffie-Hellman Key Agreement with Short Exponents. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:332-343 [Conf ] Michael J. Wiener Cryptanalysis of Short RSA Secret Exponents (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:372- [Conf ] Michael J. Wiener , Robert J. Zuccherato Faster Attacks on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:190-200 [Conf ] Whitfield Diffie , Paul C. van Oorschot , Michael J. Wiener Authentication and Authenticated Key Exchanges. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1992, v:2, n:2, pp:107-125 [Journal ] Paul C. van Oorschot , Michael J. Wiener Parallel Collision Search with Cryptanalytic Applications. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:1, pp:1-28 [Journal ] Michael J. Wiener The Full Cost of Cryptanalytic Attacks. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2004, v:17, n:2, pp:105-124 [Journal ] Michael J. Wiener Cryptanalysis of short RSA secret exponents. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:553-558 [Journal ] Search in 0.001secs, Finished in 0.002secs