Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

Cryptanalysis of a family of Keccak hash functions

2013/09/D/ST6/03918

Keywords:

cryptanalysis cryptographic hash functions

Descriptors:

  • ST6_5: Cryptography, security, privacy, quantum computing

Panel:

ST6 - Computer science and informatics: informatics and information systems, computer science, scientific computing, intelligent systems

Host institution :

Instytut Podstaw Informatyki Polskiej Akademii Nauk

woj. mazowieckie

Other projects carried out by the institution 

Principal investigator (from the host institution):

dr Paweł Morawiecki 

Number of co-investigators in the project: 1

Call: SONATA 5 - announced on 2013-03-15

Amount awarded: 182 000 PLN

Project start date (Y-m-d): 2014-02-18

Project end date (Y-m-d): 2016-02-17

Project duration:: 24 months (the same as in the proposal)

Project status: Project settled

Information in the final report

  • Publication in academic press/journals (1)
  • Articles in post-conference publications (4)
  1. Malicious Keccak
    Authors:
    Paweł Morawiecki
    Academic press:
    Fundamenta Informaticea (rok: 2017, ), Wydawca: IET Digital Library
    Status:
    Submitted
  1. ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
    Authors:
    Paweł Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik
    Conference:
    Cryptographic Hardware and Embedded Systems – CHES 2014 (rok: 2014, ), Wydawca: Springer
    Data:
    konferencja 23-26 września 2014
    Status:
    Published
  2. 1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of Keccak-224,256,384,512
    Authors:
    Donghoon Chang, Arnab Kumar, Pawel Morawiecki, Somitra Kumar Sanadhya
    Conference:
    SHA-3 Workshope (rok: 2014, ), Wydawca: National Institute of Standards and Technology
    Data:
    konferencja 22.08.2014
    Status:
    Accepted for publication
  3. Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
    Authors:
    Itai Dinur, Paweł Morawiecki, Josef Pieprzyk, Marian Srebrny, Michał Straus
    Conference:
    SHA-3 2014 Workshop (rok: 2014, ), Wydawca: National Institute of Standards and Technology
    Data:
    konferencja 22.08.2014
    Status:
    Accepted for publication
  4. Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
    Authors:
    Itai Dinur, Paweł Morawiecki, Józef Pieprzyk, Marian Srebrny, Michał Straus
    Conference:
    EUROCRYPT 2015 (rok: 2015, ), Wydawca: Springer
    Data:
    konferencja 26-30 kwietnia, 2015
    Status:
    Published