Follow
Petr Svenda
Petr Svenda
Associate Professor of Computer Science, Masaryk University
Verified email at fi.muni.cz - Homepage
Title
Cited by
Cited by
Year
The return of coppersmith's attack: Practical factorization of widely used rsa moduli
M Nemec, M Sys, P Svenda, D Klinec, V Matyas
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1572017
The million-key question—investigating the origins of {RSA} public keys
P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 893-910, 2016
422016
Towards True Random Number Generation in Mobile Environments.
J Bouda, J Krhovjak, V Matyas, P Svenda
NordSec 9, 179-189, 2009
392009
A touch of evil: High-assurance cryptographic hardware from untrusted components
V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
352017
Measuring popularity of cryptographic libraries in internet-wide scans
M Nemec, D Klinec, P Svenda, P Sekan, V Matyas
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
342017
Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
J Jancar, V Sedlacek, P Svenda, M Sys
IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020
302020
Smart dust security–key infection revisited
D Cvrcek, P Svenda
Electronic Notes in Theoretical Computer Science 157 (3), 11-25, 2006
292006
Evolutionary design of secrecy amplification protocols for wireless sensor networks
P Švenda, L Sekanina, V Matyáš
Proceedings of the second ACM conference on Wireless network security, 225-236, 2009
262009
The sources of randomness in mobile devices
J Krhovják, P Švenda, V Matyáš
Proceedings of the 12th Nordic Workshop on Secure IT Systems. NordSec, 2007
212007
Two improvements of random key predistribution for wireless sensor networks
J Kůr, V Matyáš, P Švenda
Security and Privacy in Communication Networks: 8th International ICST …, 2013
152013
Constructing empirical tests of randomness
VM Marek Sys, Petr Svenda, Martin Ukrop
SECRYPT 2014 Proceedings of the 11th International Conference on Security …, 2014
14*2014
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
142008
The Efficient Randomness Testing using Boolean Functions.
M Sýs, D Klinec, P Svenda
SECRYPT, 92-103, 2017
132017
A new approach to secrecy amplification in partially compromised networks
R Ošťádal, P Švenda, V Matyáš
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
112014
The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised …
V Matyáš, S Fischer-Hübner, D Cvrcek, P Švenda
Springer, 2009
112009
Towards cryptographic function distinguishers with evolutionary circuits
P Svenda, M Ukrop, V Matyáš
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
102013
Booltest: The fast randomness testing strategy based on Boolean functions with application to DES, 3-DES, MD5, MD6 and SHA-256
M Sýs, D Klinec, K Kubíček, P Švenda
E-Business and Telecommunications: 14th International Joint Conference …, 2019
92019
Basic comparison of Modes for Authenticated-Encryption (IAPM, XCBC, OCB, CCM, EAX, CWC, GCM, PCFB, CS)
P Švenda
URL https://www. fi. muni. cz/~ xsvenda/docs/AE_comparison_ ipics04. pdf 35, 2016
92016
Crowdsourced security reconstitution for wireless sensor networks: Secrecy amplification
R Ostadal, V Matyas, P Svenda, L Nemec
Sensors 19 (22), 5041, 2019
82019
On secrecy amplification protocols
R Ošťádal, P Švenda, V Matyáš
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20