Paweł Morawiecki
Paweł Morawiecki
Polish Academy of Sciences
Verified email at ipipan.waw.pl
TitleCited byYear
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
I Dinur, P Morawiecki, J Pieprzyk, M Srebrny, M Straus
Annual International Conference on the Theory and Applications of …, 2015
592015
A SAT-based preimage analysis of reduced KECCAK hash functions
P Morawiecki, M Srebrny
Information Processing Letters 113 (10-11), 392-397, 2013
552013
Rotational cryptanalysis of round-reduced Keccak
P Morawiecki, J Pieprzyk, M Srebrny
532012
ICEPOLE: high-speed, hardware-oriented authenticated encryption
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014
31*2014
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
E Homsirikamol, P Morawiecki, M Rogawski, M Srebrny
272012
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition.
AD Dwivedi, M Kloucek, P Morawiecki, I Nikolic, J Pieprzyk, S Wójtowicz
IACR Cryptology ePrint Archive 2016, 1053, 2016
172016
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis.
P Morawiecki, J Pieprzyk, M Srebrny, M Straus
IACR Cryptology ePrint Archive 2013, 561, 2013
142013
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function.
I Dinur, P Morawiecki, J Pieprzyk, M Srebrny, M Straus
IACR Cryptology ePrint Archive 2014, 259, 2014
132014
Efficient method of input variable partitioning in functional decomposition based on evolutionary algorithms
M Rawski, H Selvaraj, P Morawiecki
Euromicro Symposium on Digital System Design, 2004. DSD 2004., 136-143, 2004
112004
1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of Keccak-224,256,384,512
D Chang, A Kumar, P Morawiecki, SK Sanadhya
SHA-3 Workshop, 2014
92014
Decomposition of combinational circuits described by large truth tables
M Rawski, P Morawiecki, H Selvaraj
Proceedings of the 8th International Conference on Systems Engineering ICSE …, 2006
92006
Differential and Rotational Cryptanalysis of Round-reduced MORUS.
AD Dwivedi, P Morawiecki, S Wójtowicz
SECRYPT, 275-284, 2017
82017
Finding differential paths in arx ciphers through nested monte-carlo search
AD Dwivedi, P Morawiecki, S Wójtowicz
International Journal of electronics and telecommunications 64 (2), 147-150, 2018
72018
Malicious Keccak.
P Morawiecki
IACR Cryptology ePrint Archive 2015, 1085, 2015
62015
Practical Attacks on the Round-reduced PRINCE
P Morawiecki
62015
Parallel authenticated encryption with the duplex construction.
P Morawiecki, J Pieprzyk
IACR Cryptology ePrint Archive 2013, 658, 2013
62013
Application of functional decomposition in synthesis of Boolean function sets
P Morawiecki, M Rawski, H Selvaraj
2008 19th International Conference on Systems Engineering, 350-355, 2008
52008
Input variable partitioning method for functional decomposition of functions specified by large truth tables
P Morawiecki, M Rawski, H Selvaraj
International Conference on Computational Intelligence and Multimedia …, 2007
52007
Differential cryptanalysis in ARX ciphers, Application to SPECK
AD Dwivedi, P Morawiecki
IACR Cryptol. ePrint Arch 2018, 899, 2018
42018
Method of input variable partitioning in functional decomposition based on evolutionary algorithm and binary decision diagrams
P Morawiecki, M Rawski
2008 Conference on Human System Interactions, 54-59, 2008
42008
The system can't perform the operation now. Try again later.
Articles 1–20