Petr Svenda
Petr Svenda
Associate Professor of Computer Science, Masaryk University
Verified email at fi.muni.cz - Homepage
Title
Cited by
Cited by
Year
The return of coppersmith's attack: Practical factorization of widely used rsa moduli
M Nemec, M Sys, P Svenda, D Klinec, V Matyas
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1052017
Towards true random number generation in mobile environments
J Bouda, J Krhovjak, V Matyas, P Svenda
Nordic Conference on Secure IT Systems, 179-189, 2009
332009
The million-key question—investigating the origins of {RSA} public keys
P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 893-910, 2016
312016
Smart dust security–key infection revisited
D Cvrcek, P Svenda
Electronic Notes in Theoretical Computer Science 157 (3), 11-25, 2006
302006
A touch of evil: High-assurance cryptographic hardware from untrusted components
V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
272017
Evolutionary design of secrecy amplification protocols for wireless sensor networks
P Švenda, L Sekanina, V Matyáš
Proceedings of the second ACM conference on Wireless network security, 225-236, 2009
242009
Evoluční hardware: od automatického generování patentovatelných invencí k sebemodifikujícím se strojům
L Sekanina, Z VAŠÍČEK, R RŮŽIČKA
Prague: Academia, 2009
212009
The sources of randomness in mobile devices
J Krhovják, P Švenda, V Matyáš
Proceedings of the 12th Nordic Workshop on Secure IT Systems. NordSec, 2007
192007
Measuring popularity of cryptographic libraries in internet-wide scans
M Nemec, D Klinec, P Svenda, P Sekan, V Matyas
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
182017
Two improvements of random key predistribution for wireless sensor networks
J Kůr, V Matyáš, P Švenda
International Conference on Security and Privacy in Communication Systems, 61-75, 2012
122012
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
122008
Constructing empirical tests of randomness
VM Marek Sys, Petr Svenda, Martin Ukrop
SECRYPT 2014 Proceedings of the 11th International Conference on Security …, 2014
11*2014
Minerva: The curse of ECDSA nonces
J Jancar, V Sedlacek, P Svenda, M Sys
IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020
102020
The Efficient Randomness Testing using Boolean Functions.
M Sýs, D Klinec, P Svenda
SECRYPT, 92-103, 2017
92017
A new approach to secrecy amplification in partially compromised networks
R Ošťádal, P Švenda, V Matyáš
International Conference on Security, Privacy, and Applied Cryptography …, 2014
92014
The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised …
V Matyáš, S Fischer-Hübner, D Cvrcek, P Švenda
Springer, 2009
92009
On secrecy amplification protocols
R Ošťádal, P Švenda, V Matyáš
IFIP International Conference on Information Security Theory and Practice, 3-19, 2015
72015
Towards cryptographic function distinguishers with evolutionary circuits
P Svenda, M Ukrop, V Matyáš
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
72013
Secure logging of retained data for an anonymity service
S Köpsell, P Švenda
IFIP PrimeLife International Summer School on Privacy and Identity …, 2009
72009
Improving resiliency of java card code against power analysis
J Kur, T Smolka, P Svenda
Mikulaska kryptobesidka, Sbornik prispevku, 29-39, 2009
72009
The system can't perform the operation now. Try again later.
Articles 1–20