Petr Svenda
Petr Svenda
Associate Professor of Computer Science, Masaryk University
Verified email at fi.muni.cz - Homepage
Title
Cited by
Cited by
Year
The return of coppersmith's attack: Practical factorization of widely used rsa moduli
M Nemec, M Sys, P Svenda, D Klinec, V Matyas
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
972017
Towards true random number generation in mobile environments
J Bouda, J Krhovjak, V Matyas, P Svenda
Nordic Conference on Secure IT Systems, 179-189, 2009
312009
The million-key question—investigating the origins of {RSA} public keys
P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 893-910, 2016
302016
Smart dust security–key infection revisited
D Cvrcek, P Svenda
Electronic Notes in Theoretical Computer Science 157 (3), 11-25, 2006
282006
A touch of evil: High-assurance cryptographic hardware from untrusted components
V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
262017
Evolutionary design of secrecy amplification protocols for wireless sensor networks
P Švenda, L Sekanina, V Matyáš
Proceedings of the second ACM conference on Wireless network security, 225-236, 2009
242009
Evoluční hardware: od automatického generování patentovatelných invencí k sebemodifikujícím se strojům
L Sekanina, Z VAŠÍČEK, R RŮŽIČKA
Prague: Academia, 2009
202009
The sources of randomness in mobile devices
J Krhovják, V Matyas, P Svenda
In Proceeding of NORDSEC, 73-84, 2007
182007
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
142008
Two improvements of random key predistribution for wireless sensor networks
J Kůr, V Matyáš, P Švenda
International Conference on Security and Privacy in Communication Systems, 61-75, 2012
132012
Measuring popularity of cryptographic libraries in internet-wide scans
M Nemec, D Klinec, P Svenda, P Sekan, V Matyas
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
122017
Constructing empirical tests of randomness
VM Marek Sys, Petr Svenda, Martin Ukrop
SECRYPT 2014 Proceedings of the 11th International Conference on Security …, 2014
11*2014
The Efficient Randomness Testing using Boolean Functions.
M Sýs, D Klinec, P Svenda
SECRYPT, 92-103, 2017
92017
A new approach to secrecy amplification in partially compromised networks
R Ošťádal, P Švenda, V Matyáš
International Conference on Security, Privacy, and Applied Cryptography …, 2014
92014
The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised …
V Matyáš, S Fischer-Hübner, D Cvrcek, P Švenda
Springer, 2009
82009
On secrecy amplification protocols
R Ošťádal, P Švenda, V Matyáš
IFIP International Conference on Information Security Theory and Practice, 3-19, 2015
72015
Towards cryptographic function distinguishers with evolutionary circuits
P Svenda, M Ukrop, V Matyáš
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
72013
Secure logging of retained data for an anonymity service
S Köpsell, P Švenda
IFIP PrimeLife International Summer School on Privacy and Identity …, 2009
72009
Improving resiliency of java card code against power analysis
J Kur, T Smolka, P Svenda
Mikulaska kryptobesidka, Sbornik prispevku, 29-39, 2009
72009
Basic comparison of Modes for Authenticated-Encryption (IAPM, XCBC, OCB, CCM, EAX, CWC, GCM, PCFB, CS)
P Švenda
62016
The system can't perform the operation now. Try again later.
Articles 1–20