Marian Srebrny

According to our database1, Marian Srebrny authored at least 22 papers between 1990 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Applications of Key Recovery Cube-attack-like.
IACR Cryptol. ePrint Arch., 2015

2014
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2014

Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014

Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014

2013
A SAT-based preimage analysis of reduced Keccak hash functions.
Inf. Process. Lett., 2013

Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis.
IACR Cryptol. ePrint Arch., 2013

Modern Cryptography Primer - Theoretical Foundations and Practical Applications.
Springer, ISBN: 978-3-642-41385-8, 2013

2012
Rotational cryptanalysis of round-reduced Keccak.
IACR Cryptol. ePrint Arch., 2012

Security margin evaluation of SHA-3 contest finalists through SAT-based attacks.
IACR Cryptol. ePrint Arch., 2012

Remarks on the Classical Threshold Secret Sharing Schemes.
Fundam. Informaticae, 2012

2011
Towards Parallel Direct SAT-Based Cryptanalysis.
Proceedings of the Parallel Processing and Applied Mathematics, 2011

2010
SAT as a Programming Environment for Linear Algebra.
Fundam. Informaticae, 2010

2009
Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009

2008
SAT as a Programming Environment for Linear Algebra and Cryptanalysis.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2008

2007
A Propositional Programming Environment for Linear Algebra.
Fundam. Informaticae, 2007

2006
A Quantifier-free First-order Knowledge Logic of Authentication.
Fundam. Informaticae, 2006

2001
A Combinatorial Algorithm for Sharing a Key.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001

Specification of timed authentication protocols with colored Petri nets.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001

Distributed Password.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001

2000
First-Order Specifications of Programmable Data Types.
SIAM J. Comput., 2000

1996
A complete axiomatization of a first-order temporal logic over trace systems.
Proceedings of the Partial Order Methods in Verification, Proceedings of a DIMACS Workshop, 1996

1990
Measurability and the baire property at higher levels.
Math. Log. Q., 1990


  Loading...