Michael Gorski

According to our database1, Michael Gorski authored at least 20 papers between 2008 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

2010
Cryptanalysis and design of symmetric primitives.
PhD thesis, 2010

TWISTER<sub>pi</sub> - a framework for secure and fast hash functions.
Int. J. Appl. Cryptogr., 2010

Some Observations on Indifferentiability.
IACR Cryptol. ePrint Arch., 2010

Collision Resistant Double-Length Hashing.
Proceedings of the Provable Security - 4th International Conference, 2010

New Boomerang Attacks on ARIA.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode.
IACR Cryptol. ePrint Arch., 2009

Attacking Reduced Rounds of the ARIA Block Cipher.
IACR Cryptol. ePrint Arch., 2009

Security of Cyclic Double Block Length Hash Functions including Abreast-DM.
IACR Cryptol. ePrint Arch., 2009

On the Security of Tandem-DM.
IACR Cryptol. ePrint Arch., 2009

Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2.
Proceedings of the Information Security Practice and Experience, 2009

Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher.
Proceedings of the Information Security Practice and Experience, 2009

Twister- A Framework for Secure and Fast Hash Functions.
Proceedings of the Information Security Practice and Experience, 2009

Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode.
Proceedings of the Progress in Cryptology, 2009

Security of Cyclic Double Block Length Hash Functions.
Proceedings of the Cryptography and Coding, 2009

Attacking 9 and 10 Rounds of AES-256.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Slide Attacks on a Class of Hash Functions.
IACR Cryptol. ePrint Arch., 2008

New Related-Key Boomerang Attacks on AES.
IACR Cryptol. ePrint Arch., 2008

Some Observations on SHAMATA.
IACR Cryptol. ePrint Arch., 2008

Classification of the SHA-3 Candidates.
IACR Cryptol. ePrint Arch., 2008


  Loading...