BibTeX records: Krystian Matusiewicz

download as .bib file

@article{DBLP:journals/iacr/DobraunigMMT24,
  author       = {Christoph Dobraunig and
                  Krystian Matusiewicz and
                  Bart Mennink and
                  Alexander Tereschenko},
  title        = {Efficient Instances of Docked Double Decker With {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/084},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigMMT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/YaoMZ22,
  author       = {Jiewen Yao and
                  Krystian Matusiewicz and
                  Vincent Zimmer},
  title        = {Post Quantum Design in {SPDM} for Device Authentication and Key Establishment},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {48},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040048},
  doi          = {10.3390/CRYPTOGRAPHY6040048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/YaoMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoMZ22,
  author       = {Jiewen Yao and
                  Krystian Matusiewicz and
                  Vincent Zimmer},
  title        = {Post Quantum Design in {SPDM} for Device Authentication and Key Establishment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1049},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KounavisDDMW20,
  author       = {Michael E. Kounavis and
                  David Durham and
                  Sergej Deutsch and
                  Krystian Matusiewicz and
                  David Wheeler},
  title        = {The {MAGIC} Mode for Simultaneously Supporting Encryption, Message
                  Authentication and Error Correction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1460},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1460},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KounavisDDMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MorawieckiGHMPRSW14,
  author       = {Pawel Morawiecki and
                  Kris Gaj and
                  Ekawat Homsirikamol and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Marcin Rogawski and
                  Marian Srebrny and
                  Marcin W{\'{o}}jcik},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{ICEPOLE:} High-Speed, Hardware-Oriented Authenticated Encryption},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {392--413},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_22},
  doi          = {10.1007/978-3-662-44709-3\_22},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MorawieckiGHMPRSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorawieckiGHMPRSW14,
  author       = {Pawel Morawiecki and
                  Kris Gaj and
                  Ekawat Homsirikamol and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Marcin Rogawski and
                  Marian Srebrny and
                  Marcin W{\'{o}}jcik},
  title        = {{ICEPOLE:} High-speed, Hardware-oriented Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorawieckiGHMPRSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/AokiMRSS11,
  author       = {Kazumaro Aoki and
                  Krystian Matusiewicz and
                  G{\"{u}}nther Roland and
                  Yu Sasaki and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mohammad S. Obaidat and
                  Jos{\'{e}} Luis Sevillano and
                  Joaquim Filipe},
  title        = {Byte Slicing Gr{\o}stl: Improved Intel {AES-NI} and Vector-Permute
                  Implementations of the {SHA-3} Finalist Gr{\o}stl},
  booktitle    = {E-Business and Telecommunications - International Joint Conference,
                  {ICETE} 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {314},
  pages        = {281--295},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35755-8\_20},
  doi          = {10.1007/978-3-642-35755-8\_20},
  timestamp    = {Sat, 19 Oct 2019 20:35:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/AokiMRSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AumassonKKMOPS10,
  author       = {Jean{-}Philippe Aumasson and
                  Emilia K{\"{a}}sper and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Thomas Peyrin and
                  Martin Schl{\"{a}}ffer},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Distinguishers for the Compression Function and Output Transformation
                  of Hamsi-256},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_6},
  doi          = {10.1007/978-3-642-14081-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AumassonKKMOPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonGKMM10,
  author       = {Jean{-}Philippe Aumasson and
                  Jian Guo and
                  Simon Knellwolf and
                  Krystian Matusiewicz and
                  Willi Meier},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Differential and Invertibility Properties of {BLAKE}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {318--332},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_18},
  doi          = {10.1007/978-3-642-13858-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AumassonGKMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BorghoffKM10,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Krystian Matusiewicz},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Hill Climbing Algorithms and Trivium},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {57--73},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_4},
  doi          = {10.1007/978-3-642-19574-7\_4},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BorghoffKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aumasson0KMM10,
  author       = {Jean{-}Philippe Aumasson and
                  Jian Guo and
                  Simon Knellwolf and
                  Krystian Matusiewicz and
                  Willi Meier},
  title        = {Differential and invertibility properties of {BLAKE} (full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aumasson0KMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonKKMOPS10,
  author       = {Jean{-}Philippe Aumasson and
                  Emilia K{\"{a}}sper and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Thomas Peyrin and
                  Martin Schl{\"{a}}ffer},
  title        = {Distinguishers for the Compression Function and Output Transformation
                  of Hamsi-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonKKMOPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MatusiewiczNNSS09,
  author       = {Krystian Matusiewicz and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mitsuru Matsui},
  title        = {Rebound Attack on the Full Lane Compression Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {106--125},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_7},
  doi          = {10.1007/978-3-642-10366-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MatusiewiczNNSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AokiGMSW09,
  author       = {Kazumaro Aoki and
                  Jian Guo and
                  Krystian Matusiewicz and
                  Yu Sasaki and
                  Lei Wang},
  editor       = {Mitsuru Matsui},
  title        = {Preimages for Step-Reduced {SHA-2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {578--597},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_34},
  doi          = {10.1007/978-3-642-10366-7\_34},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AokiGMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BorghoffKLM09,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Krystian Matusiewicz},
  editor       = {Shai Halevi},
  title        = {Cryptanalysis of {C2}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {250--266},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_15},
  doi          = {10.1007/978-3-642-03356-8\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BorghoffKLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09,
  author       = {Alex Biryukov and
                  Praveen Gauravaram and
                  Jian Guo and
                  Dmitry Khovratovich and
                  San Ling and
                  Krystian Matusiewicz and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Orr Dunkelman},
  title        = {Cryptanalysis of the {LAKE} Hash Family},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {156--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_10},
  doi          = {10.1007/978-3-642-03317-9\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuoMKLW09,
  author       = {Jian Guo and
                  Krystian Matusiewicz and
                  Lars R. Knudsen and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Practical Pseudo-collisions for Hash Functions {ARIRANG-224/384}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_9},
  doi          = {10.1007/978-3-642-05445-7\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GuoMKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/GauravaramKMMRS09,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer and
                  S{\o}ren S. Thomsen},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Gr{\o}stl - a {SHA-3} candidate},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1955/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/GauravaramKMMRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoMKLW09,
  author       = {Jian Guo and
                  Krystian Matusiewicz and
                  Lars R. Knudsen and
                  San Ling and
                  Huaxiong Wang},
  title        = {Practical pseudo-collisions for hash functions {ARIRANG-224/384}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoMKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatusiewiczNNSS09,
  author       = {Krystian Matusiewicz and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Martin Schl{\"{a}}ffer},
  title        = {Rebound Attack on the Full {LANE} Compression Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatusiewiczNNSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoM09,
  author       = {Jian Guo and
                  Krystian Matusiewicz},
  title        = {Preimages for Step-Reduced {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SteinfeldCMPGLW08,
  author       = {Ron Steinfeld and
                  Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Jian Guo and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Kaisa Nyberg},
  title        = {Cryptanalysis of {LASH}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {207--223},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_13},
  doi          = {10.1007/978-3-540-71039-4\_13},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SteinfeldCMPGLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MatusiewiczPBCP07,
  author       = {Krystian Matusiewicz and
                  Thomas Peyrin and
                  Olivier Billet and
                  Scott Contini and
                  Josef Pieprzyk},
  editor       = {Alex Biryukov},
  title        = {Cryptanalysis of {FORK-256}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {19--38},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_2},
  doi          = {10.1007/978-3-540-74619-5\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MatusiewiczPBCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ContiniMP07,
  author       = {Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Extending {FORK-256} Attack to the Full Hash Function},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {296--305},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_23},
  doi          = {10.1007/978-3-540-77048-0\_23},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ContiniMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ContiniMPSGLW07,
  author       = {Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Jian Guo and
                  San Ling and
                  Huaxiong Wang},
  title        = {Cryptanalysis of {LASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ContiniMPSGLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatusiewiczCP06,
  author       = {Krystian Matusiewicz and
                  Scott Contini and
                  Josef Pieprzyk},
  title        = {Weaknesses of the {FORK-256} compression function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatusiewiczCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcc/MatusiewiczP05,
  author       = {Krystian Matusiewicz and
                  Josef Pieprzyk},
  editor       = {{\O}yvind Ytrehus},
  title        = {Finding Good Differential Patterns for Attacks on {SHA-1}},
  booktitle    = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen,
                  Norway, March 14-18, 2005. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3969},
  pages        = {164--177},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11779360\_14},
  doi          = {10.1007/11779360\_14},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcc/MatusiewiczP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/MatusiewiczPPRR05,
  author       = {Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Christopher Wolf and
                  Stefan Lucks and
                  Po{-}Wah Yau},
  title        = {Analysis of simplified variants of {SHA-256}},
  booktitle    = {WEWoRC 2005 - Western European Workshop on Research in Cryptology,
                  July 5-7, 2005, Leuven, Belgium},
  series       = {{LNI}},
  volume       = {{P-74}},
  pages        = {123--134},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/24844},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/MatusiewiczPPRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatusiewiczP04,
  author       = {Krystian Matusiewicz and
                  Josef Pieprzyk},
  title        = {Finding good differential patterns for attacks on {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatusiewiczP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics