Krystian Matusiewicz
Postdoctoral researcher
Department of Mathematics
Technical University of Denmark
2009
2008
- Going through the security proof of Grøstl; crypto@ DTU MAT seminar, Sept. 2008 [pdf]
- Provably secure hash functions -- do we care?; Presentation at Quo vadis cryptology 2008 - Hash Functions and Stream Ciphers - 6th International Workshop on the state of the art in cryptology and new challenges ahead
Warsaw, Poland, 30 May 2008, [pdf]
- Attacks on cryptographic hash functions; Presentation at XII National Conference on Cryptography and Computer Security ENIGMA 2008, Warsaw, Poland [pdf]
2007
- Extending FORK-256 Attack to the Full Hash Function; Presentation at ICICS 2007, Zhengzhou, China [pdf],
- Extending FORK-256 Attack to the Full Hash Function; ACAC seminar, Macquarie University, Australia [pdf],
- Doing research (in cryptography) -- tools of the trade, seminar in Department of Mathematics, Nanyang Technological University, Singapore [pdf],
- Introduction to cryptographic hash functions, seminar in Department of Mathematics, Nanyang Technological University, Singapore [pdf],
- New trends in the design of cryptographic hash functions, tutorial at the V KNI Workshop on Cryptography and Information Security (in Polish), [pdf (slides in English)]
- Cryptanalysis of FORK-256 and some comments
on the state of hash functions research, seminar at the Institute of Mathematics of Polish Academy of Sciences, Warsaw, Poland [pdf],
- Cryptanalysis of FORK-256, FSE 2007 [pdf],
2006
- Weaknesses of the FORK-256 compression function, ASIACRYPT 2006 Rump Session [pdf],
- Hacking hash functions or how to find a needle in a haystack, LUCID'2006 poster [A1 pdf A4 pdf],
- Cryptanalysis of short variants of SHA-256-XOR, Postgraduate Mini-Conference 2006, Macquarie Uni [pdf],
2005
- Collisions for simplified variants of SHA-256, WeWoRC 2005 presentation [pdf],
- On differential patterns for attacks on SHA-1, WCC 2005 presentation [pdf],