Krystian Matusiewicz

According to our database1, Krystian Matusiewicz authored at least 22 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Instances of Docked Double Decker With AES.
IACR Cryptol. ePrint Arch., 2024

2022
Post Quantum Design in SPDM for Device Authentication and Key Establishment.
Cryptogr., 2022

2020
The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction.
IACR Cryptol. ePrint Arch., 2020

2014
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2014

2011
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

2010
Distinguishers for the Compression Function and Output Transformation of Hamsi-256.
IACR Cryptol. ePrint Arch., 2010

Differential and invertibility properties of BLAKE (full version).
IACR Cryptol. ePrint Arch., 2010

Hill Climbing Algorithms and Trivium.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Differential and Invertibility Properties of BLAKE.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Rebound Attack on the Full LANE Compression Function.
IACR Cryptol. ePrint Arch., 2009

Practical pseudo-collisions for hash functions ARIRANG-224/384.
IACR Cryptol. ePrint Arch., 2009

Preimages for Step-Reduced SHA-2.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Grøstl - a SHA-3 candidate.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

Cryptanalysis of C2.
Proceedings of the Advances in Cryptology, 2009

Preimages for Step-Reduced SHA-2.
Proceedings of the Advances in Cryptology, 2009

2007
Cryptanalysis of LASH.
IACR Cryptol. ePrint Arch., 2007

Extending FORK-256 Attack to the Full Hash Function.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Weaknesses of the FORK-256 compression function.
IACR Cryptol. ePrint Arch., 2006

2005
Analysis of simplified variants of SHA-256.
Proceedings of the WEWoRC 2005, 2005

2004
Finding good differential patterns for attacks on SHA-1.
IACR Cryptol. ePrint Arch., 2004


  Loading...