Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael J. Wiener is active.

Publication


Featured researches published by Michael J. Wiener.


canadian conference on electrical and computer engineering | 1999

An analysis of the CAST-256 cipher

Carlisle Adams; Howard M. Heys; Stafford E. Tavares; Michael J. Wiener

We examine the cryptographic security of the CAST-256 symmetric block encryption algorithm. The CAST-256 cipher has been proposed as a candidate for the Advanced Encryption Standard currently under consideration by the U.S. National Institute of Standards and Technology (NTST). It has been designed for a 128-bit block size and variable key sizes of up to 256 bits to suit AES requirements. We specifically consider the cryptographic security of the cipher in relation to the cryptanalytic property of diffusion and the cryptanalysis techniques of linear and differential cryptanalysis.


Archive | 2007

Selected Areas in Cryptography

Carlisle Adams; Ali Miri; Michael J. Wiener

Block Cipher Cryptanalysis.- Improved DST Cryptanalysis of IDEA.- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.- Related-Key Rectangle Attack on the Full SHACAL-1.- Stream Cipher Cryptanalysis I.- Cryptanalysis of Achterbahn-Version 2.- Cryptanalysis of the Stream Cipher ABC v2.- The Design of a Stream Cipher LEX.- Dial C for Cipher.- Improved Security Analysis of XEX and LRW Modes.- Extended Hidden Number Problem and Its Cryptanalytic Applications.- Changing the Odds Against Masked Logic.- Advances on Access-Driven Cache Attacks on AES.- Blind Differential Cryptanalysis for Enhanced Power Attacks.- Efficient Implementations I.- Efficient Implementations of Multivariate Quadratic Systems.- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems.- Stream Cipher Cryptanalysis II.- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.- Multi-pass Fast Correlation Attack on Stream Ciphers.- Crossword Puzzle Attack on NLS.- Invited Talk.- When Stream Cipher Analysis Meets Public-Key Cryptography.- Efficient Implementations II.- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets.- Pairing Calculation on Supersingular Genus 2 Curves.- Efficient Divisor Class Halving on Genus Two Curves.- Message Authentication on 64-Bit Architectures.- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme.- Constructing an Ideal Hash Function from Weak Ideal Compression Functions.- Provably Good Codes for Hash Function Design.


Archive | 1998

Multi-factor biometric authenticating device and method

Carlisle Adams; Michael J. Wiener


Archive | 1997

System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user

Roland Thomas Lockhart; Michael J. Wiener


Archive | 1998

Data management system and method for a limited capacity cryptographic storage unit

Roland Thomas Lockhart; Michael J. Wiener


Archive | 1997

Design principles of the shade cipher

Carlisle Adams; Michael J. Wiener


AES Candidate Conference | 1998

CAST256: a submission for the advanced encryption standard

Carlisle Adams; Howard M. Heys; Stafford E. Tavares; Michael J. Wiener


SAC | 2007

Selected areas in cryptography : 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers

Sac; Carlisle Adams; Ali Miri; Michael J. Wiener


Archive | 2007

Proceedings of the 14th international conference on Selected areas in cryptography

Carlisle Adams; Ali Miri; Michael J. Wiener


Archive | 1996

Creation d'algorithmes cryptographiques par la procedure de conception cast

Carlisle Adams; Michael J. Wiener; Roland Thomas Lockhart

Collaboration


Dive into the Michael J. Wiener's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Howard M. Heys

Memorial University of Newfoundland

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge