Personal information

Activities

Employment (1)

WSB University in Poznań: Poznań, PL

2015-10-01 to present
Employment
Source: Self-asserted source
Janusz Stokłosa

Works (18)

PP-2 block cipher

SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies
2013 | Conference paper
EID:

2-s2.0-84894186535

Contributors: Bucholc, K.; Chmiel, K.; Grocholewska-Czurylo, A.; Stoklosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Evaluation of PP-1 cipher resistance against differential and linear cryptanalysis in comparison to a DES-like cipher

Fundamenta Informaticae
2012 | Journal article
EID:

2-s2.0-84860124332

Contributors: Chmiel, K.; Grocholewska-Czurylo, A.; Stoklosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

HaF: A new family of hash functions

PECCS 2012 - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems
2012 | Conference paper
EID:

2-s2.0-84862136927

Contributors: Bilski, T.; Bucholc, K.; Grocholewska-Czurylo, A.; Stoklosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Mobile agent-based digital rights management scheme implementation

Communications in Computer and Information Science
2010 | Book
EID:

2-s2.0-77956132161

Contributors: Ziółkowski, B.; Stokłosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Scalable PP-1 block cipher

International Journal of Applied Mathematics and Computer Science
2010 | Journal article
EID:

2-s2.0-77954415230

Contributors: Bucholc, K.; Chmiel, K.; Grocholewska-Czuryło, A.; Idzikowska, E.; Janicka-Lipska, I.; Stokłosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Family of parameterized hash algorithms

Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.
2008 | Conference paper
EID:

2-s2.0-55849140545

Contributors: Rodwald, P.; Stokłosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Involutional block cipher for limited resources

GLOBECOM - IEEE Global Telecommunications Conference
2008 | Conference paper
EID:

2-s2.0-67249102887

Contributors: Chmiel, K.; Grocholewska-Czurylo, A.; Stoklosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

PHAL-256 - parameterized hash algorithm

Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
2008 | Conference paper
EID:

2-s2.0-55349131358

Contributors: Rodwald, P.; Stokłosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Mobile agent-based digital rights management scheme

Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007
2007 | Conference paper
EID:

2-s2.0-47749127037

Contributors: Ziółkowski, B.; Stokłosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Compound inversive congruential generator as a source of keys for stream ciphers

Proceedings of The 2005 International Conference on Security and Management, SAM'05
2005 | Conference paper
EID:

2-s2.0-62349101876

Contributors: Bubicz, J.; Stoklosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Cryptographic hash functions in digital economy

Proceedings of the ISAT International Scientific School
2001 | Journal article
EID:

2-s2.0-0035675787

Contributors: Najjar, M.; Stoklosa, J.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Cryptography and electronic payment systems

Informatica (Ljubljana)
1998 | Journal article
EID:

2-s2.0-0032024642

Contributors: Stoklosa, Janusz
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

METHOD OF KEY GENERATION FOR ENCRYPTION DEVICES.

Advances in modelling & simulation
1986 | Journal article
EID:

2-s2.0-0022605914

Contributors: Stoklosa, Janusz
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

On a Method of Key Generation for the Information Protection.,O PEWNEJ METODZIE GENEROWANIA KLUCZY DO OCHRONY INFORMACJI.

Archiwum Automatyki i Telemechaniki
1985 | Journal article
EID:

2-s2.0-0022329753

Contributors: Stoklosa, Janusz
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

ON SOME DISCRETE MODELS AND RELATIONS BETWEEN THEM.

Advances in modelling & simulation
1985 | Journal article
EID:

2-s2.0-0022313690

Contributors: Stoklosa, Janusz
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

DIFFERENCE EQUATIONS AND ( alpha , k)-MACHINES.

Systems Science
1983 | Journal article
EID:

2-s2.0-0020990798

Contributors: Stoklosa, Janusz
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

COMPUTATIONS IN THE NETWORK OF ( alpha ,k)- MACHINES.

1982 | Conference paper
EID:

2-s2.0-0020248710

Contributors: Stoklosa, Janusz
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier

Computations of (α, k)-machines

Theoretical Computer Science
1981 | Journal article
EID:

2-s2.0-49149136739

Contributors: Stokłosa, J.; Zakowski, W.
Source: Self-asserted source
Janusz Stokłosa via Scopus - Elsevier