Krystian Matusiewicz
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2014
- [c15]Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik:
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption. CHES 2014: 392-413 - [i10]Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik:
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption. IACR Cryptology ePrint Archive 2014: 266 (2014) - 2011
- [c14]Kazumaro Aoki, Krystian Matusiewicz, Günther Roland, Yu Sasaki, Martin Schläffer:
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl. ICETE (Selected Papers) 2011: 281-295 - 2010
- [c13]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. ACISP 2010: 87-103 - [c12]Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and Invertibility Properties of BLAKE. FSE 2010: 318-332 - [c11]Julia Borghoff, Lars R. Knudsen, Krystian Matusiewicz:
Hill Climbing Algorithms and Trivium. Selected Areas in Cryptography 2010: 57-73 - [i9]Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and invertibility properties of BLAKE (full version). IACR Cryptology ePrint Archive 2010: 43 (2010) - [i8]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. IACR Cryptology ePrint Archive 2010: 91 (2010)
2000 – 2009
- 2009
- [c10]Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer:
Rebound Attack on the Full Lane Compression Function. ASIACRYPT 2009: 106-125 - [c9]Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang:
Preimages for Step-Reduced SHA-2. ASIACRYPT 2009: 578-597 - [c8]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz:
Cryptanalysis of C2. CRYPTO 2009: 250-266 - [c7]Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179 - [c6]Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang:
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. Selected Areas in Cryptography 2009: 141-156 - [i7]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - [i6]Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang:
Practical pseudo-collisions for hash functions ARIRANG-224/384. IACR Cryptology ePrint Archive 2009: 197 (2009) - [i5]Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer:
Rebound Attack on the Full LANE Compression Function. IACR Cryptology ePrint Archive 2009: 443 (2009) - [i4]Jian Guo, Krystian Matusiewicz:
Preimages for Step-Reduced SHA-2. IACR Cryptology ePrint Archive 2009: 477 (2009) - 2008
- [c5]Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. FSE 2008: 207-223 - 2007
- [c4]Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk:
Cryptanalysis of FORK-256. FSE 2007: 19-38 - [c3]Scott Contini, Krystian Matusiewicz, Josef Pieprzyk:
Extending FORK-256 Attack to the Full Hash Function. ICICS 2007: 296-305 - [i3]Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. IACR Cryptology ePrint Archive 2007: 430 (2007) - 2006
- [i2]Krystian Matusiewicz, Scott Contini, Josef Pieprzyk:
Weaknesses of the FORK-256 compression function. IACR Cryptology ePrint Archive 2006: 317 (2006) - 2005
- [c2]Krystian Matusiewicz, Josef Pieprzyk:
Finding Good Differential Patterns for Attacks on SHA-1. WCC 2005: 164-177 - [c1]Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134 - 2004
- [i1]Krystian Matusiewicz, Josef Pieprzyk:
Finding good differential patterns for attacks on SHA-1. IACR Cryptology ePrint Archive 2004: 364 (2004)
Coauthor Index
last updated on 2019-01-09 01:29 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint