2008 |
5 | EE | Ron Steinfeld,
Scott Contini,
Krystian Matusiewicz,
Josef Pieprzyk,
Jian Guo,
San Ling,
Huaxiong Wang:
Cryptanalysis of LASH.
FSE 2008: 207-223 |
2007 |
4 | EE | Krystian Matusiewicz,
Thomas Peyrin,
Olivier Billet,
Scott Contini,
Josef Pieprzyk:
Cryptanalysis of FORK-256.
FSE 2007: 19-38 |
3 | EE | Scott Contini,
Krystian Matusiewicz,
Josef Pieprzyk:
Extending FORK-256 Attack to the Full Hash Function.
ICICS 2007: 296-305 |
2005 |
2 | EE | Krystian Matusiewicz,
Josef Pieprzyk:
Finding Good Differential Patterns for Attacks on SHA-1.
WCC 2005: 164-177 |
1 | | Krystian Matusiewicz,
Josef Pieprzyk,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Analysis of simplified variants of SHA-256.
WEWoRC 2005: 123-134 |