Follow
Krystian Matusiewicz
Krystian Matusiewicz
Security Researcher at Intel
Verified email at intel.com
Title
Cited by
Cited by
Year
Grøstl-a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2009
3332009
Preimages for step-reduced SHA-2
K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
1492009
Rebound Attack on the Full Lane Compression Function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
702009
Finding good differential patterns for attacks on SHA-1
K Matusiewicz, J Pieprzyk
Coding and Cryptography: International Workshop, WCC 2005, Bergen, Norway …, 2006
572006
Analysis of simplified variants of SHA-256
K Matusiewicz, J Pieprzyk, N Pramstaller, C Rechberger, V Rijmen
Gesellschaft für Informatik eV, 2005
392005
Grøstl–a SHA-3 candidate. Submission to NIST, 2008
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
35
Distinguishers for the compression function and output transformation of Hamsi-256
JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, R Ødegård, ...
Information Security and Privacy: 15th Australasian Conference, ACISP 2010 …, 2010
302010
Differential and invertibility properties of BLAKE
JP Aumasson, J Guo, S Knellwolf, K Matusiewicz, W Meier
International Workshop on Fast Software Encryption, 318-332, 2010
292010
Cryptanalysis of C2
J Borghoff, LR Knudsen, G Leander, K Matusiewicz
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
272009
ICEPOLE: high-speed, hardware-oriented authenticated encryption
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
262014
Cryptanalysis of FORK-256
K Matusiewicz, T Peyrin, O Billet, S Contini, J Pieprzyk
Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg …, 2007
242007
Hill climbing algorithms and trivium
J Borghoff, LR Knudsen, K Matusiewicz
Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011
222011
Grøstl–a SHA-3 candidate. Submission to NIST (Round 3)(2011)
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
19
Observations on the Shabal keyed permutation
LR Knudsen, K Matusiewicz, SS Thomsen
Official Comment 78, 118-121, 2009
152009
ICEPOLE v1
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
Submission to CAESAR competition, 2014
142014
Grøstl: a SHA-3 candidate, 2011
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Submission to NIST’s SHA-3 competition, 0
14
Post quantum design in SPDM for device authentication and key establishment
J Yao, K Matusiewicz, V Zimmer
Cryptography 6 (4), 48, 2022
132022
A critical look at cryptographic hash function literature
S Contini, R Steinfeld, J Pieprzyk, K Matusiewicz
Coding and Cryptology, 58-79, 2008
132008
Analysis of Modern Dedicated Cryptographic Hash Functions
K Matusiewicz
Macquarie University, 2007
122007
Weaknesses of the FORK-256 compression function
K Matusiewicz, S Contini, J Pieprzyk
Cryptology ePrint Archive, 2006
112006
The system can't perform the operation now. Try again later.
Articles 1–20