Dariusz Rzonca

Learn More
The paper analyzes the encryption algorithm, described in the literature , based on a custom application of cryptographically strong hash functions. Potential weaknesses and possible attacks have been described. One of them requires partial knowledge of the plaintext, while the second one needs only the uneven distribution of bits (unknown to intruder) at(More)
IEC 61131-3 standard defines five languages for programming industrial controllers. They support both textual and graphical development approaches. In case of Function Block Diagram graphical language, diagrams consist of a set of elements connected with lines, which have various length and shape. Development of an editor supporting diagrams design involves(More)