Grøstl-a SHA-3 candidate P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... Dagstuhl Seminar Proceedings, 2009 | 282 | 2009 |
Preimages for step-reduced SHA-2 K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang International Conference on the Theory and Application of Cryptology and …, 2009 | 127 | 2009 |
Rebound attack on the full LANE compression function K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer International Conference on the Theory and Application of Cryptology and …, 2009 | 66 | 2009 |
Analysis of simplified variants of SHA-256 K Matusiewicz, J Pieprzyk, N Pramstaller, C Rechberger, V Rijmen WEWoRC 2005–Western European Workshop on Research in Cryptology, 2005 | 36 | 2005 |
Distinguishers for the compression function and output transformation of Hamsi-256 JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, R Ødegård, ... Australasian Conference on Information Security and Privacy, 87-103, 2010 | 30 | 2010 |
Grøstl–a SHA-3 candidate. Submission to NIST (2008) P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... | 30 | |
Finding good differential patterns for attacks on SHA-1 K Matusiewicz, J Pieprzyk International Workshop on Coding and Cryptography, 164-177, 2005 | 29 | 2005 |
Differential and invertibility properties of BLAKE JP Aumasson, J Guo, S Knellwolf, K Matusiewicz, W Meier International Workshop on Fast Software Encryption, 318-332, 2010 | 28 | 2010 |
Cryptanalysis of C2 J Borghoff, LR Knudsen, G Leander, K Matusiewicz Annual International Cryptology Conference, 250-266, 2009 | 27 | 2009 |
Cryptanalysis of FORK-256 K Matusiewicz, T Peyrin, O Billet, S Contini, J Pieprzyk International Workshop on Fast Software Encryption, 19-38, 2007 | 26 | 2007 |
Finding good differential patterns for attacks on SHA-1. K Matusiewicz, J Pieprzyk IACR Cryptol. ePrint Arch. 2004, 364, 2004 | 23 | 2004 |
Hill climbing algorithms and trivium J Borghoff, LR Knudsen, K Matusiewicz International Workshop on Selected Areas in Cryptography, 57-73, 2010 | 19 | 2010 |
ICEPOLE: high-speed, hardware-oriented authenticated encryption P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ... International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014 | 17 | 2014 |
Grøstl–a SHA-3 candidate. Submission to NIST (Round 3)(2011) P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... | 17 | |
Observations on the Shabal keyed permutation LR Knudsen, K Matusiewicz, SS Thomsen OFFICIAL COMMENT 78, 118-121, 2009 | 15 | 2009 |
Analysis of Modern Dedicated Cryptographic Hash Functions K Matusiewicz Macquarie University, 2007 | 14 | 2007 |
A critical look at cryptographic hash function literature S Contini, R Steinfeld, J Pieprzyk, K Matusiewicz Coding and Cryptology, 58-79, 2008 | 13 | 2008 |
Weaknesses of the FORK-256 compression function. K Matusiewicz, S Contini, J Pieprzyk IACR Cryptol. ePrint Arch. 2006, 317, 2006 | 12 | 2006 |
Grøstl: a SHA-3 candidate, 2011 P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... Submission to NIST’s SHA-3 competition, 0 | 11 | |
Practical pseudo-collisions for hash functions ARIRANG-224/384 J Guo, K Matusiewicz, LR Knudsen, S Ling, H Wang International Workshop on Selected Areas in Cryptography, 141-156, 2009 | 10 | 2009 |