| 1 | 2009 | CHES | pc |
| 2 | 2006 | Eurocrypt | pc |
| 3 | 2003 | Crypto | pc |
| 4 | 2003 | PKC | pc |
| 5 | 2001 | CHES | pc |
| 6 | 2000 | CHES | pc |
| 7 | 1999 | Crypto | pc chair |
| 8 | 1999 | CHES | pc |
| 9 | 1997 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2005 | Bounds on Birthday Attack Times | eprint | online |
| 2 | 2004 | The Full Cost of Cryptanalytic Attacks | jofc | 105-124 |
| 3 | 2003 | Safe Prime Generation with a Combined Sieve | eprint | online |
| 4 | 1999 | Parallel Collision Search with Cryptanalytic Applications | jofc | 1-28 |
| 5 | 1996 | On Diffie-Hellman Key Agreement with Short Exponents | eurocrypt | 332-343 |
| 6 | 1996 | Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude | crypto | 229-236 |
| 7 | 1992 | DES is not a Group | crypto | 512-520 |
| 8 | 1990 | A Known Plaintext Attack on Two-Key Triple Encryption | eurocrypt | 318-325 |
| 9 | 1989 | Cryptanalysis of Short RSA Secret Exponents (Abstract) | eurocrypt | 372 |
| 10 | 1988 | A Secure Audio Teleconference System | crypto | 520-528 |
Coauthors of Michael J. Wiener |