Michael J. Wiener

According to our database1, Michael J. Wiener authored at least 20 papers between 1988 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
White-box cryptography: practical protection on hostile hosts.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Applying Software Protection to White-Box Cryptography.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2011
Exhaustive Key Search.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A New Perspective on Providing Cloud Computing Security - A Position Paper.
Proceedings of the CLOSER 2011, 2011

2005
Bounds on Birthday Attack Times.
IACR Cryptology ePrint Archive, 2005

2004
The Full Cost of Cryptanalytic Attacks.
J. Cryptology, 2004

2003
Safe Prime Generation with a Combined Sieve.
IACR Cryptology ePrint Archive, 2003

1999
Parallel Collision Search with Cryptanalytic Applications.
J. Cryptology, 1999

1998
Faster Attacks on Elliptic Curve Cryptosystems.
Proceedings of the Selected Areas in Cryptography '98, 1998

On the Performance of Signature Schemes Based on Elliptic Curves.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

1996
On Diffie-Hellman Key Agreement with Short Exponents.
Proceedings of the Advances in Cryptology, 1996

Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude.
Proceedings of the Advances in Cryptology, 1996

1994
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
Proceedings of the CCS '94, 1994

A Key Distribution Method for Object-Based Protection.
Proceedings of the CCS '94, 1994

1992
Authentication and Authenticated Key Exchanges.
Des. Codes Cryptogr., 1992

DES is not a Group.
Proceedings of the Advances in Cryptology, 1992

1990
Cryptanalysis of short RSA secret exponents.
IEEE Trans. Information Theory, 1990

A Known Plaintext Attack on Two-Key Triple Encryption.
Proceedings of the Advances in Cryptology, 1990

1989
Cryptanalysis of Short RSA Secret Exponents (Abstract).
Proceedings of the Advances in Cryptology, 1989

1988
A Secure Audio Teleconference System.
Proceedings of the Advances in Cryptology, 1988


  Loading...