Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Paweł Morawiecki
Practical Attacks on the Round-Reduced PRINCE
IET Information Security
Computer Networks
Software
Information Systems
Communications
Related publications
Practical-Time Attacks Against Reduced Variants of MISTY1
Designs, Codes, and Cryptography
Combinatorics
Applied Mathematics
Computer Science Applications
Theoretical Computer Science
Discrete Mathematics
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Rotational Rebound Attacks on Reduced Skein
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
A Meet-In-The-Middle Attack on Reduced-Round Crypton
Software Engineering and Applications
Collisions for Round-Reduced LAKE
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of Reduced-Round MISTY
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Practical Eavesdropping and Skimming Attacks on High-Frequency RFID Tokens
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science