# Michael J. Wiener

According to our database

Collaborative distances:

^{1}, Michael J. Wiener authored at least 20 papers between 1988 and 2016.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2016

White-box cryptography: practical protection on hostile hosts.

Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015

Applying Software Protection to White-Box Cryptography.

Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2011

Exhaustive Key Search.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A New Perspective on Providing Cloud Computing Security - A Position Paper.

Proceedings of the CLOSER 2011, 2011

2005

Bounds on Birthday Attack Times.

IACR Cryptology ePrint Archive, 2005

2004

The Full Cost of Cryptanalytic Attacks.

J. Cryptology, 2004

2003

Safe Prime Generation with a Combined Sieve.

IACR Cryptology ePrint Archive, 2003

1999

Parallel Collision Search with Cryptanalytic Applications.

J. Cryptology, 1999

1998

Faster Attacks on Elliptic Curve Cryptosystems.

Proceedings of the Selected Areas in Cryptography '98, 1998

On the Performance of Signature Schemes Based on Elliptic Curves.

Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

1996

On Diffie-Hellman Key Agreement with Short Exponents.

Proceedings of the Advances in Cryptology, 1996

Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude.

Proceedings of the Advances in Cryptology, 1996

1994

Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.

Proceedings of the CCS '94, 1994

A Key Distribution Method for Object-Based Protection.

Proceedings of the CCS '94, 1994

1992

Authentication and Authenticated Key Exchanges.

Des. Codes Cryptogr., 1992

DES is not a Group.

Proceedings of the Advances in Cryptology, 1992

1990

Cryptanalysis of short RSA secret exponents.

IEEE Trans. Information Theory, 1990

A Known Plaintext Attack on Two-Key Triple Encryption.

Proceedings of the Advances in Cryptology, 1990

1989

Cryptanalysis of Short RSA Secret Exponents (Abstract).

Proceedings of the Advances in Cryptology, 1989

1988

A Secure Audio Teleconference System.

Proceedings of the Advances in Cryptology, 1988