Krystian Matusiewicz
Krystian Matusiewicz
Security Researcher at Intel
Verified email at intel.com
TitleCited byYear
Grøstl-a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Dagstuhl Seminar Proceedings, 2009
2412009
Preimages for step-reduced SHA-2
K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang
International Conference on the Theory and Application of Cryptology and …, 2009
1202009
Rebound attack on the full LANE compression function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
722009
Analysis of simplified variants of SHA-256.
K Matusiewicz, J Pieprzyk, N Pramstaller, C Rechberger, V Rijmen
WEWoRC 74, 123-134, 2005
352005
Finding good differential patterns for attacks on SHA-1
K Matusiewicz, J Pieprzyk
International Workshop on Coding and Cryptography, 164-177, 2005
332005
Grøstl–a SHA-3 candidate. Submission to NIST (2008)
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
29
Distinguishers for the compression function and output transformation of Hamsi-256
JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, R Ødegård, ...
Australasian Conference on Information Security and Privacy, 87-103, 2010
272010
Cryptanalysis of FORK-256
K Matusiewicz, T Peyrin, O Billet, S Contini, J Pieprzyk
International Workshop on Fast Software Encryption, 19-38, 2007
262007
Differential and invertibility properties of BLAKE
JP Aumasson, J Guo, S Knellwolf, K Matusiewicz, W Meier
International Workshop on Fast Software Encryption, 318-332, 2010
252010
Cryptanalysis of C2
J Borghoff, LR Knudsen, G Leander, K Matusiewicz
Annual International Cryptology Conference, 250-266, 2009
252009
Finding good differential patterns for attacks on SHA-1
K Matusiewicz, J Pieprzyk
In International Workshop on Coding and Cryptography, 2004
182004
Grøstl–a SHA-3 candidate. Submission to NIST (Round 3)(2011)
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
17
ICEPOLE: high-speed, hardware-oriented authenticated encryption
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014
162014
Grøstl: a SHA-3 candidate, 2011
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Submission to NIST’s SHA-3 competition, 0
16
Hill climbing algorithms and trivium
J Borghoff, LR Knudsen, K Matusiewicz
International Workshop on Selected Areas in Cryptography, 57-73, 2010
142010
Observations on the Shabal keyed permutation
LR Knudsen, K Matusiewicz, SS Thomsen
OFFICIAL COMMENT 78, 118-121, 2009
142009
Weaknesses of the FORK-256 compression function.
K Matusiewicz, S Contini, J Pieprzyk
IACR Cryptology ePrint Archive 2006, 317, 2006
132006
A critical look at cryptographic hash function literature
S Contini, R Steinfeld, J Pieprzyk, K Matusiewicz
Coding And Cryptology, 58-79, 2008
112008
Practical pseudo-collisions for hash functions ARIRANG-224/384
J Guo, K Matusiewicz, LR Knudsen, S Ling, H Wang
International Workshop on Selected Areas in Cryptography, 141-156, 2009
102009
Analysis of Modern Dedicated Cryptographic Hash Functions
K Matusiewicz
Macquarie University, 2007
102007
The system can't perform the operation now. Try again later.
Articles 1–20