Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Krystian Matusiewicz
@article{DBLP:journals/iacr/DobraunigMMT24, author = {Christoph Dobraunig and Krystian Matusiewicz and Bart Mennink and Alexander Tereschenko}, title = {Efficient Instances of Docked Double Decker With {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2024}, url = {https://eprint.iacr.org/2024/084}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigMMT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/YaoMZ22, author = {Jiewen Yao and Krystian Matusiewicz and Vincent Zimmer}, title = {Post Quantum Design in {SPDM} for Device Authentication and Key Establishment}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {48}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040048}, doi = {10.3390/CRYPTOGRAPHY6040048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/YaoMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoMZ22, author = {Jiewen Yao and Krystian Matusiewicz and Vincent Zimmer}, title = {Post Quantum Design in {SPDM} for Device Authentication and Key Establishment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2022}, url = {https://eprint.iacr.org/2022/1049}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YaoMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KounavisDDMW20, author = {Michael E. Kounavis and David Durham and Sergej Deutsch and Krystian Matusiewicz and David Wheeler}, title = {The {MAGIC} Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1460}, year = {2020}, url = {https://eprint.iacr.org/2020/1460}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KounavisDDMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MorawieckiGHMPRSW14, author = {Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin W{\'{o}}jcik}, editor = {Lejla Batina and Matthew Robshaw}, title = {{ICEPOLE:} High-Speed, Hardware-Oriented Authenticated Encryption}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {392--413}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_22}, doi = {10.1007/978-3-662-44709-3\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MorawieckiGHMPRSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorawieckiGHMPRSW14, author = {Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin W{\'{o}}jcik}, title = {{ICEPOLE:} High-speed, Hardware-oriented Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2014}, url = {http://eprint.iacr.org/2014/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorawieckiGHMPRSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/AokiMRSS11, author = {Kazumaro Aoki and Krystian Matusiewicz and G{\"{u}}nther Roland and Yu Sasaki and Martin Schl{\"{a}}ffer}, editor = {Mohammad S. Obaidat and Jos{\'{e}} Luis Sevillano and Joaquim Filipe}, title = {Byte Slicing Gr{\o}stl: Improved Intel {AES-NI} and Vector-Permute Implementations of the {SHA-3} Finalist Gr{\o}stl}, booktitle = {E-Business and Telecommunications - International Joint Conference, {ICETE} 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {314}, pages = {281--295}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35755-8\_20}, doi = {10.1007/978-3-642-35755-8\_20}, timestamp = {Sat, 19 Oct 2019 20:35:36 +0200}, biburl = {https://dblp.org/rec/conf/icete/AokiMRSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AumassonKKMOPS10, author = {Jean{-}Philippe Aumasson and Emilia K{\"{a}}sper and Lars R. Knudsen and Krystian Matusiewicz and Rune Steinsmo {\O}deg{\aa}rd and Thomas Peyrin and Martin Schl{\"{a}}ffer}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Distinguishers for the Compression Function and Output Transformation of Hamsi-256}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {87--103}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_6}, doi = {10.1007/978-3-642-14081-5\_6}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AumassonKKMOPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AumassonGKMM10, author = {Jean{-}Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Differential and Invertibility Properties of {BLAKE}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {318--332}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_18}, doi = {10.1007/978-3-642-13858-4\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AumassonGKMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BorghoffKM10, author = {Julia Borghoff and Lars R. Knudsen and Krystian Matusiewicz}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Hill Climbing Algorithms and Trivium}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {57--73}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_4}, doi = {10.1007/978-3-642-19574-7\_4}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BorghoffKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aumasson0KMM10, author = {Jean{-}Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier}, title = {Differential and invertibility properties of {BLAKE} (full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2010}, url = {http://eprint.iacr.org/2010/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aumasson0KMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonKKMOPS10, author = {Jean{-}Philippe Aumasson and Emilia K{\"{a}}sper and Lars R. Knudsen and Krystian Matusiewicz and Rune Steinsmo {\O}deg{\aa}rd and Thomas Peyrin and Martin Schl{\"{a}}ffer}, title = {Distinguishers for the Compression Function and Output Transformation of Hamsi-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2010}, url = {http://eprint.iacr.org/2010/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonKKMOPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MatusiewiczNNSS09, author = {Krystian Matusiewicz and Mar{\'{\i}}a Naya{-}Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schl{\"{a}}ffer}, editor = {Mitsuru Matsui}, title = {Rebound Attack on the Full Lane Compression Function}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {106--125}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_7}, doi = {10.1007/978-3-642-10366-7\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MatusiewiczNNSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AokiGMSW09, author = {Kazumaro Aoki and Jian Guo and Krystian Matusiewicz and Yu Sasaki and Lei Wang}, editor = {Mitsuru Matsui}, title = {Preimages for Step-Reduced {SHA-2}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {578--597}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_34}, doi = {10.1007/978-3-642-10366-7\_34}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AokiGMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BorghoffKLM09, author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and Krystian Matusiewicz}, editor = {Shai Halevi}, title = {Cryptanalysis of {C2}}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {250--266}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_15}, doi = {10.1007/978-3-642-03356-8\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BorghoffKLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09, author = {Alex Biryukov and Praveen Gauravaram and Jian Guo and Dmitry Khovratovich and San Ling and Krystian Matusiewicz and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, editor = {Orr Dunkelman}, title = {Cryptanalysis of the {LAKE} Hash Family}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {156--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_10}, doi = {10.1007/978-3-642-03317-9\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GuoMKLW09, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Practical Pseudo-collisions for Hash Functions {ARIRANG-224/384}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {141--156}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_9}, doi = {10.1007/978-3-642-05445-7\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GuoMKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/GauravaramKMMRS09, author = {Praveen Gauravaram and Lars R. Knudsen and Krystian Matusiewicz and Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer and S{\o}ren S. Thomsen}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Gr{\o}stl - a {SHA-3} candidate}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1955/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/GauravaramKMMRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoMKLW09, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, title = {Practical pseudo-collisions for hash functions {ARIRANG-224/384}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2009}, url = {http://eprint.iacr.org/2009/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoMKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatusiewiczNNSS09, author = {Krystian Matusiewicz and Mar{\'{\i}}a Naya{-}Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schl{\"{a}}ffer}, title = {Rebound Attack on the Full {LANE} Compression Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2009}, url = {http://eprint.iacr.org/2009/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatusiewiczNNSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoM09, author = {Jian Guo and Krystian Matusiewicz}, title = {Preimages for Step-Reduced {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2009}, url = {http://eprint.iacr.org/2009/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SteinfeldCMPGLW08, author = {Ron Steinfeld and Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Jian Guo and San Ling and Huaxiong Wang}, editor = {Kaisa Nyberg}, title = {Cryptanalysis of {LASH}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {207--223}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_13}, doi = {10.1007/978-3-540-71039-4\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SteinfeldCMPGLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MatusiewiczPBCP07, author = {Krystian Matusiewicz and Thomas Peyrin and Olivier Billet and Scott Contini and Josef Pieprzyk}, editor = {Alex Biryukov}, title = {Cryptanalysis of {FORK-256}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {19--38}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_2}, doi = {10.1007/978-3-540-74619-5\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MatusiewiczPBCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ContiniMP07, author = {Scott Contini and Krystian Matusiewicz and Josef Pieprzyk}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Extending {FORK-256} Attack to the Full Hash Function}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {296--305}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_23}, doi = {10.1007/978-3-540-77048-0\_23}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ContiniMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ContiniMPSGLW07, author = {Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang}, title = {Cryptanalysis of {LASH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2007}, url = {http://eprint.iacr.org/2007/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ContiniMPSGLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatusiewiczCP06, author = {Krystian Matusiewicz and Scott Contini and Josef Pieprzyk}, title = {Weaknesses of the {FORK-256} compression function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2006}, url = {http://eprint.iacr.org/2006/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatusiewiczCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcc/MatusiewiczP05, author = {Krystian Matusiewicz and Josef Pieprzyk}, editor = {{\O}yvind Ytrehus}, title = {Finding Good Differential Patterns for Attacks on {SHA-1}}, booktitle = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3969}, pages = {164--177}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11779360\_14}, doi = {10.1007/11779360\_14}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcc/MatusiewiczP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/MatusiewiczPPRR05, author = {Krystian Matusiewicz and Josef Pieprzyk and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Christopher Wolf and Stefan Lucks and Po{-}Wah Yau}, title = {Analysis of simplified variants of {SHA-256}}, booktitle = {WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium}, series = {{LNI}}, volume = {{P-74}}, pages = {123--134}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/24844}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/MatusiewiczPPRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatusiewiczP04, author = {Krystian Matusiewicz and Josef Pieprzyk}, title = {Finding good differential patterns for attacks on {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2004}, url = {http://eprint.iacr.org/2004/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatusiewiczP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.