Michael J. Wiener

Michael is a cryptologist with a strong interest in cryptanalysis.

michael.james.wiener AT gmail.com

Selected Publications 

pdf M.J. Wiener, The Full Cost of Cryptanalytic Attacks, Journal of Cryptology, vol. 17, no. 2, 2004, pp 105-124.
pdf P.C. van Oorschot and M.J. Wiener, Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, vol. 12, no. 1, 1999, pp. 1-28.

The following two papers contain preliminary versions of parts of the paper above.
  pdf P.C. van Oorschot and M.J. Wiener, Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude, Advances in Cryptology - Crypto ’96 (LNCS 1109), Springer, 1996, pp. 229-236.
  pdf P.C. van Oorschot and M.J. Wiener, Parallel Collision Search with Application to Hash Functions and Discrete Logarithms, 2nd ACM Conference on Computer and Communications Security, ACM Press, 1994, pp. 210-218.
pdf M.J. Wiener and R.J. Zuccherato, Faster Attacks on Elliptic Curve Cryptosystems, Selected Areas in Cryptography, SAC ’98 (LNCS 1556), Springer, 1998, pp. 190-200.
pdf P.C. van Oorschot and M.J. Wiener, On Diffie-Hellman Key Agreement with Short Exponents, Advances in Cryptology - Eurocrypt ’96 (LNCS 1070), Springer-Verlag, 1996, pp. 332-343.
pdf M.J. Wiener, Efficient DES Key Search, Crypto ’93, Santa Barbara, California, USA, August 1993.  Reprinted in Practical Cryptography for Data Internetworks, W. Stallings editor, IEEE Computer Society Press, 1996, pp. 31-79.
pdf M. Blaze, W. Diffie, R.L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M.J. Wiener, Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security, manuscript, Jan. 1996.
pdf K.W. Campbell and M.J. Wiener, DES is not a Group, Advances in Cryptology - Crypto ’92 (LNCS 740), Springer-Verrlag, 1993, pp. 512-520.
pdf W. Diffie, P.C. van Oorschot, and M.J. Wiener, Authentication and Authenticated Key Exchanges, Designs, Codes and Cryptography, vol. 2, no. 2, 1992, pp. 107-125.
pdf P.C. van Oorschot and M.J. Wiener, A Known-Plaintext Attack on Two-Key Triple Encryption, Advances in Cryptology - Eurocrypt ’90 (LNCS 473), Springer-Verlag, 1990, pp. 318-325.
pdf M.J. Wiener, Cryptanalysis of Short RSA Secret Exponents, IEEE Transactions on Information Theory, vol. 36, no. 3, 1990, pp. 553-558.  Presented at Eurocrypt ’89, Houthalen, Belgium, April 1989.