Cryptographers' World
 

Michael J. Wiener


Author's Web Page Link

10 papers in database with 1877 citations StarStarStar

Editor of 2 conference proceedings books

H-number: 10

Conference Proceedings

 
1. Carlisle M. AdamsAli MiriMichael J. Wiener, editors, Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers. Springer, 2007. ISBN 3-540-77359-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Michael J. Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Springer, 1999. ISBN 3-540-66347-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Michael J. Wiener,  The Full Cost of Cryptanalytic Attacks, Journal of Cryptology, Volume 17(2), pp. 105 - 124, Springer, 2004.

[Cited 19 times ]

2. Paul C. van Oorschot,  Michael J. Wiener,  Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, Volume 12(1), pp. 1 - 28, Springer, 1999.

[Cited 279 times Red StarRed StarRed Star]

3. Whitfield Diffie,  Paul C. van Oorschot,  Michael J. Wiener,  Authentication and Authenticated Key Exchanges, Designs, Codes and Cryptography, Volume 2(2), pp. 107 - 125, Springer, 1992.

[Electronic Edition][Cited 693 times Red StarRed StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Michael J. Wiener,  Robert J. Zuccherato,  Faster Attacks on Elliptic Curve Cryptosystems, pp. 190 - 200, SAC 1998.

[Electronic Edition][Cited 112 times Red StarRed Star]

2. Paul C. van Oorschot,  Michael J. Wiener,  Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude, pp. 229 - 236, CRYPTO 1996.

[Electronic Edition][Cited 23 times ]

3. Paul C. van Oorschot,  Michael J. Wiener,  On Diffie-Hellman Key Agreement with Short Exponents, pp. 332 - 343, EUROCRYPT 1996.

[Electronic Edition][Cited 110 times Red StarRed Star]

4. Keith W. Campbell,  Michael J. Wiener,  DES is not a Group, pp. 512 - 520, CRYPTO 1992.

[Electronic Edition][Cited 44 times ]

5. Paul C. van Oorschot,  Michael J. Wiener,  A Known Plaintext Attack on Two-Key Triple Encryption, pp. 318 - 325, EUROCRYPT 1990.

[Electronic Edition][Cited 57 times Red Star]

6. Michael J. Wiener,  Cryptanalysis of Short RSA Secret Exponents (Abstract), pp. 372 - 372, EUROCRYPT 1989.

[Electronic Edition][Cited 368 times Red StarRed StarRed Star]

7. D. G. Steer,  L. Strawczynski,  Whitfield Diffie,  Michael J. Wiener,  A Secure Audio Teleconference System, pp. 520 - 528, CRYPTO 1988.

[Electronic Edition][Cited 172 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...