Follow
Petr Svenda
Petr Svenda
Associate Professor of Computer Science, Masaryk University
Verified email at fi.muni.cz - Homepage
Title
Cited by
Cited by
Year
The return of coppersmith's attack: Practical factorization of widely used RSA moduli
M Nemec, M Sys, P Svenda, D Klinec, V Matyas
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2052017
Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
J Jancar, V Sedlacek, P Svenda, M Sys
IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020
712020
The {Million-Key}{Question—Investigating} the Origins of {RSA} Public Keys
P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ...
25th USENIX Security Symposium (USENIX Security 16), 893-910, 2016
542016
A touch of evil: High-assurance cryptographic hardware from untrusted components
V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
482017
Measuring popularity of cryptographic libraries in internet-wide scans
M Nemec, D Klinec, P Svenda, P Sekan, V Matyas
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
452017
Towards true random number generation in mobile environments
J Bouda, J Krhovjak, V Matyas, P Svenda
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure …, 2009
412009
Smart dust security–key infection revisited
D Cvrcek, P Svenda
Electronic Notes in Theoretical Computer Science 157 (3), 11-25, 2006
302006
Evolutionary design of secrecy amplification protocols for wireless sensor networks
P Švenda, L Sekanina, V Matyáš
Proceedings of the second ACM conference on Wireless network security, 225-236, 2009
272009
The sources of randomness in mobile devices
J Krhovják, P Švenda, V Matyáš
Proceedings of the Nordsec, 2007
232007
Booltest: The fast randomness testing strategy based on Boolean functions with application to DES, 3-DES, MD5, MD6 and SHA-256
M Sýs, D Klinec, K Kubíček, P Švenda
E-Business and Telecommunications: 14th International Joint Conference …, 2019
162019
The Efficient Randomness Testing using Boolean Functions.
M Sýs, D Klinec, P Svenda
SECRYPT, 92-103, 2017
162017
Basic comparison of Modes for Authenticated-Encryption (IAPM, XCBC, OCB, CCM, EAX, CWC, GCM, PCFB, CS)
P Švenda
URL https://www. fi. muni. cz/~ xsvenda/docs/AE_comparison_ ipics04. pdf 35, 2016
162016
JCMathLib: wrapper cryptographic library for transparent and certifiable JavaCard applets
V Mavroudis, P Svenda
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 89-96, 2020
152020
Constructing empirical tests of randomness
VM Marek Sys, Petr Svenda, Martin Ukrop
SECRYPT 2014 Proceedings of the 11th International Conference on Security …, 2014
15*2014
Two improvements of random key predistribution for wireless sensor networks
J Kůr, V Matyáš, P Švenda
Security and Privacy in Communication Networks: 8th International ICST …, 2013
152013
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
122008
A new approach to secrecy amplification in partially compromised networks
R Ošťádal, P Švenda, V Matyáš
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
112014
Towards cryptographic function distinguishers with evolutionary circuits
P Svenda, M Ukrop, V Matyáš
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
112013
The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised …
V Matyáš, S Fischer-Hübner, D Cvrcek, P Švenda
Springer Science & Business Media, 2009
102009
Autentizace uživatelů a autorizace elektronických transakcí
V Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, D Cvrček, J Staudek, ...
TATE International, sro, 2007
102007
The system can't perform the operation now. Try again later.
Articles 1–20