Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function I Dinur, P Morawiecki, J Pieprzyk, M Srebrny, M Straus Annual International Conference on the Theory and Applications of …, 2015 | 77 | 2015 |
Rotational cryptanalysis of round-reduced Keccak P Morawiecki, J Pieprzyk, M Srebrny | 68 | 2012 |
A SAT-based preimage analysis of reduced KECCAK hash functions P Morawiecki, M Srebrny Information Processing Letters 113 (10-11), 392-397, 2013 | 67 | 2013 |
ICEPOLE: high-speed, hardware-oriented authenticated encryption P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ... International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014 | 32* | 2014 |
Differential cryptanalysis of round-reduced speck suitable for internet of things devices AD Dwivedi, P Morawiecki, G Srivastava IEEE Access 7, 16476-16486, 2019 | 31 | 2019 |
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. AD Dwivedi, M Kloucek, P Morawiecki, I Nikolic, J Pieprzyk, S Wójtowicz IACR Cryptol. ePrint Arch. 2016, 1053, 2016 | 31 | 2016 |
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks E Homsirikamol, P Morawiecki, M Rogawski, M Srebrny | 31 | 2012 |
Finding differential paths in arx ciphers through nested monte-carlo search DA Dhar, P Morawiecki, S Wójtowicz International Journal of electronics and telecommunications, 2018 | 16 | 2018 |
Practical Attacks on the Round-reduced PRINCE P Morawiecki | 16 | 2015 |
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function. I Dinur, P Morawiecki, J Pieprzyk, M Srebrny, M Straus IACR Cryptol. ePrint Arch. 2014, 259, 2014 | 15 | 2014 |
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis. P Morawiecki, J Pieprzyk, M Srebrny, M Straus IACR Cryptol. ePrint Arch. 2013, 561, 2013 | 14 | 2013 |
Malicious Keccak. P Morawiecki IACR Cryptol. ePrint Arch. 2015, 1085, 2015 | 13 | 2015 |
1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of Keccak-224,256,384,512 D Chang, A Kumar, P Morawiecki, SK Sanadhya SHA-3 workshop, 2014 | 12 | 2014 |
Efficient method of input variable partitioning in functional decomposition based on evolutionary algorithms M Rawski, H Selvaraj, P Morawiecki Euromicro Symposium on Digital System Design, 2004. DSD 2004., 136-143, 2004 | 11 | 2004 |
Differential and Rotational Cryptanalysis of Round-reduced MORUS. AD Dwivedi, P Morawiecki, S Wójtowicz SECRYPT 2017, 275-284, 2017 | 10 | 2017 |
Deep neural networks for coreference resolution for Polish B Nitoń, P Morawiecki, M Ogrodniczuk Proceedings of the Eleventh International Conference on Language Resources …, 2018 | 9 | 2018 |
Decomposition of combinational circuits described by large truth tables M Rawski, P Morawiecki, H Selvaraj Proceedings of Eighteenth International Conference on Systems Engineering …, 2006 | 9 | 2006 |
Parallel authenticated encryption with the duplex construction. P Morawiecki, J Pieprzyk IACR Cryptol. ePrint Arch. 2013, 658, 2013 | 7 | 2013 |
Differential-linear and related key cryptanalysis of round-reduced scream AD Dwivedi, P Morawiecki, R Singh, S Dhar Information Processing Letters 136, 5-8, 2018 | 6 | 2018 |
Differential cryptanalysis in ARX ciphers, Application to SPECK. AD Dwivedi, P Morawiecki IACR Cryptol. ePrint Arch. 2018, 899, 2018 | 5 | 2018 |