Krystian Matusiewicz
Postdoctoral researcher
Department of Mathematics
Technical University of Denmark
2009
- K. Matusiewicz, M. Naya-Plasencia, I. Nikolić, Y. Sasaki and M. Schläffer, Rebound Attack on the Full LANE Compression Function ASIACRYPT 2009; to appear in LNCS, Springer 2009
- K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki and L. Wang, Preimages for Step-Reduced SHA-2, ASIACRYPT 2009; to appear in LNCS, Springer 2009
- J. Guo, K. Matusiewicz, L.R. Knudsen, S. Ling, H. Wang, Practical pseudo-collisions for hash functions ARIRANG-224/384, paper presented at SAC 2009, postproceedings to appear in LNCS 5867, Springer
- J. Borghoff, L.R. Knudsen, G. Leander, K. Matusiewicz Cryptanalysis of C2, Proc CRYPTO 2009; LNCS 5677, Springer 2009
- A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, I. Nikolic, J. Pieprzyk and H. Wang Collisions of the LAKE Hash Family, Proc. FSE 2009; LNCS 5665, Springer, [DOI link]
2008
- P. Gauravaram, L. R. Knudsen, K. Matusiewicz, F. Mendel, Ch. Rechberger, M. Schläffer, and S. S. Thomsen, Grøstl -- a SHA-3 candidate, submission to NIST Advanced Hash Standard Competition, www.groestl.info, 2008
- K. Matusiewicz, Ataki na kryptograficzne funkcje skrotu (Attacks on cryptographic hash functions), Proc. XII National Conference on Cryptography and Computer Security ENIGMA 2008, Warsaw, Poland (in Polish)
- R. Steinfeld, S. Contini, K. Matusiewicz, J. Pieprzyk, Guo Jian, Ling San, Huaxiong Wang, Cryptanalysis of LASH, Proc. FSE 2008; LNCS 5086, Springer, [DOI link]
2007
- K. Matusiewicz, Analysis of modern dedicated cryptographic hash functions, PhD thesis, Macquarie University, August 2007, [local pdf]
- S. Contini, K. Matusiewicz and J. Pieprzyk, Extending FORK-256 Attack to the Full Hash Function, Proc. ICICS 2007, December 12-15, Zhengzhou, China; LNCS 4861, Springer [DOI link, local pdf]
- S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz, A Critical Look at Cryptographic Hashing Literature, Proc. Coding Theory and Cryptology, First International Workshop Wuyi Mountain, Fujian, China; World Scientific Publishing 2007, (previous version appeared in ECRYPT Hash Workshop'07, May 24 - 25, 2007, Barcelona, Spain) [local pdf]
- K. Matusiewicz, T. Peyrin, O. Billet, S. Contini and J. Pieprzyk, Cryptanalysis of FORK-256, Proc. FSE 2007, March 26-28, Luxembourg; LNCS 4593, Springer [DOI link, local pdf, companion website]
2006
2005
- K. Matusiewicz, J. Pieprzyk, N. Pramstaller, Ch. Rechberger, V. Rijmen, Analysis of simplified variants of SHA-256, Proc. Western European Workshop on Research in Cryptology, WeWoRC 2005, July 5-7, 2005, Leuven, Belgium; Lecture Notes in Informatics, P-74, Gesellschaft für Informatik [local pdf]
- K. Matusiewicz, J. Pieprzyk, Finding good differential patterns for attacks on SHA-1, Proc. International Workshop on Coding and Cryptography, WCC 2005, March 14-18, 2005, Bergen, Norway; LNCS 3969, Springer [DOI link; local pdf]
(previous version available as: IACR Cryptology ePrint Archive, report 2004/364)
older
- K. Matusiewicz, Data Protection Mechanisms in Java (in Polish), Proc. VII National Conference on Applications of Cryptography ENIGMA 2003, May 12-14, 2003, Warsaw, Poland,
- K. Matusiewicz, Access Control Models and their Impact on the Security of Computer Systems (in Polish), M.Sc. Thesis, Catholic University of Lublin, 2002, Lublin, Poland
- K. Matusiewicz, P. Urbanowicz, Management of Data Objects in Access Control Models Based on Roles, Proc. Byelorussian State Technological University, 2002, Minsk, Byelorus
- K.Matusiewicz, Models and Analysis of Security in Computer Networks, Proc. of 2nd International Symposium NEET 2001, Feb. 2001, Kazimierz Dolny, Poland.