Grøstl-a SHA-3 candidate P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... Dagstuhl Seminar Proceedings, 2009 | 309 | 2009 |
Preimages for step-reduced SHA-2 K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 139 | 2009 |
Rebound Attack on the Full Lane Compression Function K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 69 | 2009 |
Analysis of simplified variants of SHA-256 K Matusiewicz, J Pieprzyk, N Pramstaller, C Rechberger, V Rijmen WEWoRC 2005–Western European Workshop on Research in Cryptology, 2005 | 37 | 2005 |
Grøstl–a SHA-3 candidate. Submission to NIST (2008) P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... | 31 | |
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, RS Ødegård, ... ACISP 10, 87-103, 2010 | 30 | 2010 |
Finding good differential patterns for attacks on SHA-1 K Matusiewicz, J Pieprzyk Lecture notes in computer science 3969, 164-177, 2006 | 30 | 2006 |
Cryptanalysis of C2 J Borghoff, LR Knudsen, G Leander, K Matusiewicz Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 28 | 2009 |
Differential and invertibility properties of BLAKE JP Aumasson, J Guo, S Knellwolf, K Matusiewicz, W Meier Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 27 | 2010 |
Cryptanalysis of FORK-256 K Matusiewicz, T Peyrin, O Billet, S Contini, J Pieprzyk Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg …, 2007 | 25 | 2007 |
ICEPOLE: high-speed, hardware-oriented authenticated encryption P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ... Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 22 | 2014 |
Finding good differential patterns for attacks on SHA-1 K Matusiewicz, J Pieprzyk Cryptology ePrint Archive, 2004 | 22 | 2004 |
Hill climbing algorithms and trivium J Borghoff, LR Knudsen, K Matusiewicz Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011 | 21 | 2011 |
Grøstl–a SHA-3 candidate. Submission to NIST (Round 3)(2011) P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... | 18 | |
Observations on the Shabal keyed permutation LR Knudsen, K Matusiewicz, SS Thomsen Official Comment 78, 118-121, 2009 | 15 | 2009 |
A critical look at cryptographic hash function literature S Contini, R Steinfeld, J Pieprzyk, K Matusiewicz Coding and Cryptology, 58-79, 2008 | 13 | 2008 |
Analysis of Modern Dedicated Cryptographic Hash Functions K Matusiewicz Macquarie University, 2007 | 12 | 2007 |
Weaknesses of the FORK-256 compression function K Matusiewicz, S Contini, J Pieprzyk Cryptology ePrint Archive, 2006 | 12 | 2006 |
Grøstl: a SHA-3 candidate, 2011 P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... Submission to NIST’s SHA-3 competition, 0 | 12 | |
ICEPOLE v1 P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ... submitted to the CAESAR competition, 2015 | 11 | 2015 |