Følg
Petr Svenda
Petr Svenda
Associate Professor of Computer Science, Masaryk University
Verifisert e-postadresse på fi.muni.cz - Startside
Tittel
Sitert av
Sitert av
År
The return of coppersmith's attack: Practical factorization of widely used rsa moduli
M Nemec, M Sys, P Svenda, D Klinec, V Matyas
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1882017
Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
J Jancar, V Sedlacek, P Svenda, M Sys
IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020
532020
The {Million-Key}{Question—Investigating} the Origins of {RSA} Public Keys
P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ...
25th USENIX Security Symposium (USENIX Security 16), 893-910, 2016
532016
A touch of evil: High-assurance cryptographic hardware from untrusted components
V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
442017
Towards true random number generation in mobile environments
J Bouda, J Krhovjak, V Matyas, P Svenda
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure …, 2009
422009
Measuring popularity of cryptographic libraries in internet-wide scans
M Nemec, D Klinec, P Svenda, P Sekan, V Matyas
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
412017
Smart dust security–key infection revisited
D Cvrcek, P Svenda
Electronic Notes in Theoretical Computer Science 157 (3), 11-25, 2006
282006
Evolutionary design of secrecy amplification protocols for wireless sensor networks
P Švenda, L Sekanina, V Matyáš
Proceedings of the second ACM conference on Wireless network security, 225-236, 2009
262009
The sources of randomness in mobile devices
J Krhovják, P Švenda, V Matyáš
Proceedings of the Nordsec, 2007
232007
The Efficient Randomness Testing using Boolean Functions.
M Sýs, D Klinec, P Svenda
SECRYPT, 92-103, 2017
162017
Booltest: The fast randomness testing strategy based on Boolean functions with application to DES, 3-DES, MD5, MD6 and SHA-256
M Sýs, D Klinec, K Kubíček, P Švenda
E-Business and Telecommunications: 14th International Joint Conference …, 2019
152019
Two improvements of random key predistribution for wireless sensor networks
J Kůr, V Matyáš, P Švenda
Security and Privacy in Communication Networks: 8th International ICST …, 2013
152013
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
152008
Constructing empirical tests of randomness
VM Marek Sys, Petr Svenda, Martin Ukrop
SECRYPT 2014 Proceedings of the 11th International Conference on Security …, 2014
14*2014
The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised …
V Matyáš, S Fischer-Hübner, D Cvrcek, P Švenda
Springer Science & Business Media, 2009
142009
JCMathLib: wrapper cryptographic library for transparent and certifiable JavaCard applets
V Mavroudis, P Svenda
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 89-96, 2020
122020
A new approach to secrecy amplification in partially compromised networks
R Ošťádal, P Švenda, V Matyáš
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
112014
Towards cryptographic function distinguishers with evolutionary circuits
P Svenda, M Ukrop, V Matyáš
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
112013
Basic comparison of Modes for Authenticated-Encryption (IAPM, XCBC, OCB, CCM, EAX, CWC, GCM, PCFB, CS)
P Švenda
URL https://www. fi. muni. cz/~ xsvenda/docs/AE_comparison_ ipics04. pdf 35, 2016
102016
Crowdsourced security reconstitution for wireless sensor networks: Secrecy amplification
R Ostadal, V Matyas, P Svenda, L Nemec
Sensors 19 (22), 5041, 2019
82019
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20