default search action
Marian Srebrny
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2013
- [b1]Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny:
Modern Cryptography Primer - Theoretical Foundations and Practical Applications. Springer 2013, ISBN 978-3-642-41385-8, pp. 1-231
Journal Articles
- 2013
- [j7]Pawel Morawiecki, Marian Srebrny:
A SAT-based preimage analysis of reduced Keccak hash functions. Inf. Process. Lett. 113(10-11): 392-397 (2013) - 2012
- [j6]Stanislaw Spiez, Marian Srebrny, Jerzy Urbanowicz:
Remarks on the Classical Threshold Secret Sharing Schemes. Fundam. Informaticae 114(3-4): 345-357 (2012) - 2010
- [j5]Marian Srebrny, Lidia Stepien:
SAT as a Programming Environment for Linear Algebra. Fundam. Informaticae 102(1): 115-127 (2010) - 2007
- [j4]Marian Srebrny, Lidia Stepien:
A Propositional Programming Environment for Linear Algebra. Fundam. Informaticae 81(1-3): 325-345 (2007) - 2006
- [j3]Miroslaw Kurkowski, Marian Srebrny:
A Quantifier-free First-order Knowledge Logic of Authentication. Fundam. Informaticae 72(1-3): 263-282 (2006) - 2000
- [j2]Grazyna Mirkowska, Andrzej Salwicki, Marian Srebrny, Andrzej Tarlecki:
First-Order Specifications of Programmable Data Types. SIAM J. Comput. 30(6): 2084-2096 (2000) - 1990
- [j1]Adam Krawczyk, Marian Srebrny:
Measurability and the baire property at higher levels. Math. Log. Q. 36(5): 377-380 (1990)
Conference and Workshop Papers
- 2015
- [c11]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function. EUROCRYPT (1) 2015: 733-761 - 2014
- [c10]Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik:
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption. CHES 2014: 392-413 - 2013
- [c9]Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny:
Rotational Cryptanalysis of Round-Reduced Keccak. FSE 2013: 241-262 - 2012
- [c8]Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny:
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks. CISIM 2012: 56-67 - 2011
- [c7]Pawel Dudek, Miroslaw Kurkowski, Marian Srebrny:
Towards Parallel Direct SAT-Based Cryptanalysis. PPAM (1) 2011: 266-275 - 2009
- [c6]Marian Srebrny, Piotr Such:
Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations. KES-AMSTA 2009: 367-379 - 2008
- [c5]Marian Srebrny, Mateusz Srebrny, Lidia Stepien:
SAT as a Programming Environment for Linear Algebra and Cryptanalysis. ISAIM 2008 - 2001
- [c4]Gizela Jakubowska, Marian Srebrny:
Specification of timed authentication protocols with colored Petri nets. ACS 2001: 383-392 - [c3]Zbigniew Lonc, Marian Srebrny:
A Combinatorial Algorithm for Sharing a Key. ACS 2001: 393-406 - [c2]Wojciech Dobrzanski, Artur Soroczuk, Marian Srebrny, Mateusz Srebrny:
Distributed Password. ACS 2001: 407-415 - 1996
- [c1]Wojciech Penczek, Marian Srebrny:
A complete axiomatization of a first-order temporal logic over trace systems. Partial Order Methods in Verification 1996: 79-97
Informal and Other Publications
- 2015
- [i8]Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny:
Applications of Key Recovery Cube-attack-like. IACR Cryptol. ePrint Arch. 2015: 1009 (2015) - 2014
- [i7]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2014: 259 (2014) - [i6]Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik:
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption. IACR Cryptol. ePrint Arch. 2014: 266 (2014) - [i5]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2014: 736 (2014) - 2013
- [i4]Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis. IACR Cryptol. ePrint Arch. 2013: 561 (2013) - 2012
- [i3]Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny:
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks. IACR Cryptol. ePrint Arch. 2012: 421 (2012) - [i2]Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny:
Rotational cryptanalysis of round-reduced Keccak. IACR Cryptol. ePrint Arch. 2012: 546 (2012) - 2010
- [i1]Pawel Morawiecki, Marian Srebrny:
A SAT-based preimage analysis of reduced KECCAK hash functions. IACR Cryptol. ePrint Arch. 2010: 285 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint