Masarykova univerzita

Výpis publikací

česky | in English

Filtrování publikací

    2025

    1. DUFKA, Antonín, Peeter LAUD a Petr ŠVENDA. Two-party ECDSA with JavaCard-based smartcards. In Applied Cryptography and Network Security: 23rd International Conference on Applied Cryptography and Network Security. 2025.

    2024

    1. JANOVSKÝ, Adam, Lukasz Michal CHMIELEWSKI, Petr ŠVENDA, Ján JANČÁR a Václav MATYÁŠ. Chain of Trust: Unraveling References Among Common Criteria Certified Products. Online. In Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis. ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology. volume 710. Cham: Springer Nature Switzerland, 2024, s. 191-205. ISBN 978-3-031-65175-5. Dostupné z: https://dx.doi.org/10.1007/978-3-031-65175-5_14.
    2. JANČÁR, Ján, Vojtěch SUCHÁNEK, Petr ŠVENDA, Vladimír SEDLÁČEK a Lukasz Michal CHMIELEWSKI. pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis. Online. In IACR Transactions on Cryptographic Hardware and Embedded Systems. Německo: Ruhr-University of Bochum, 2024, s. 355-381. ISSN 2569-2925. Dostupné z: https://dx.doi.org/10.46586/tches.v2024.i4.355-381.
    3. JANOVSKÝ, Adam, Ján JANČÁR, Petr ŠVENDA, Lukasz Michal CHMIELEWSKI, Jiří MICHALÍK a Václav MATYÁŠ. sec-certs: Examining the security certification practice for better vulnerability mitigation. Computers & Security. 2024, roč. 2024, č. 143, s. 1-13. ISSN 0167-4048. Dostupné z: https://dx.doi.org/10.1016/j.cose.2024.103895.
    4. ZAORAL, Lukáš, Antonín DUFKA a Petr ŠVENDA. The adoption rate of JavaCard features by certified products and open-source projects. Online. In Bhasin, S., Roche, T. Smart Card Research and Advanced Applications. Springer Nature Switzerland: Springer, Cham, 2024, s. 169-189. ISBN 978-3-031-54408-8. Dostupné z: https://dx.doi.org/10.1007/978-3-031-54409-5_9.
    5. BAKHTINA, Mariia, Jan KVAPIL, Petr ŠVENDA a Raimundas MATULEVICIUS. The Power of Many: Securing Organisational Identity Through Distributed Key Management. Online. In Advanced Information Systems Engineering (CAiSE 24). Cham (Switzerland): Springer Nature Switzerland, 2024, s. 475-491. ISBN 978-3-031-61056-1. Dostupné z: https://dx.doi.org/10.1007/978-3-031-61057-8_28.
    6. ŠVENDA, Petr, Antonín DUFKA, Milan BROŽ, Roman LACKO, Tomáš JAROŠ, Daniel ZAŤOVIČ a Josef POSPISIL. TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips. Online. In IACR Transactions on Cryptographic Hardware and Embedded Systems. Bochum: Ruhr-University of Bochum, 2024, s. 714-734. ISSN 2569-2925. Dostupné z: https://dx.doi.org/10.46586/tches.v2024.i2.714-734.
    7. DUFKA, Antonín, Jakub JANKŮ a Petr ŠVENDA. Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation. Online. In Proceedings of the 19th International Conference on Availability, Reliability and Security (ARES '24). Wien, Austria: Association for Computing Machinery, 2024, s. 1-10. ISBN 979-8-4007-1718-5. Dostupné z: https://dx.doi.org/10.1145/3664476.3670889.

    2023

    1. BAKHTINA, Mariia, Kin Long LEUNG, Raimundas MATULEVICIUS, Ahmed AWAD a Petr ŠVENDA. A Decentralised Public Key Infrastructure for X-Road. Online. In 979-8-4007-0772-8. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023. Benevento, Italy: ACM, 2023, s. 1-20. ISBN 979-8-4007-0772-8. Dostupné z: https://dx.doi.org/10.1145/3600160.3605092.
    2. DUFKA, Antonín a Petr ŠVENDA. Enabling Efficient Threshold Signature Computation via Java Card API. Online. In Proceedings of the 18th International Conference on Availability, Reliability and Security. Benevento, Italy: Association for Computing Machinery, 2023, s. 1-10. ISBN 979-8-4007-0772-8. Dostupné z: https://dx.doi.org/10.1145/3600160.3600180.
    3. STUPKA, Václav, Pavel LOUTOCKÝ, Antonín DUFKA a Petr ŠVENDA. Multi party signatures and electronic evidence in criminal proceedings. Jusletter IT. Weblaw AG, 2023, roč. 2023, č. 3, s. 419-425. ISSN 1664-848X. Dostupné z: https://dx.doi.org/10.38023/95440eb4-0311-40e8-80e8-e7761ac25706.

    2022

    1. ŠVENDA, Petr a Adam JANOVSKÝ. Analysis of cryptographic implementations, Intermediate report fo progress for NUKIB, CRoCS@FI Masaryk Univerzity. 2022.
    2. ŠVENDA, Petr, Rudolf KVAŠŇOVSKÝ, Imrich NAGY a Antonín DUFKA. JCAlgTest: Robust identification metadata for certified smartcards. Online. In Sabrina De Capitani di Vimercati. Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022). Portugal: INSTICC, 2022, s. 597-604. ISBN 978-989-758-590-6. Dostupné z: https://dx.doi.org/10.5220/0011294000003283.
    3. KLINEC, Dušan, Marek SÝS, Karel KUBÍČEK, Petr ŠVENDA a Václav MATYÁŠ. Large-scale randomness study of security margins for 100+ cryptographic functions. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 19th International Conference on Security and Cryptography. Lisbon, Portugal: Scitepress, 2022, s. 134-146. ISBN 978-989-758-590-6. Dostupné z: https://dx.doi.org/10.5220/0011267600003283.
    4. DUFKA, Antonín, Vladimír SEDLÁČEK a Petr ŠVENDA. SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes. Online. In Proceedings of the 19th International Conference on Security and Cryptography. Lisbon, Portugal: SCITEPRESS, 2022, s. 305-316. ISBN 978-989-758-590-6. Dostupné z: https://dx.doi.org/10.5220/0011145600003283.

    2021

    1. NĚMEC, Lukáš, Václav MATYÁŠ, Radim OŠŤÁDAL a Petr ŠVENDA. Practical approach to re-securing compromised wireless sensor networks. Online. In Procedia Computer Science - 16th International Conference on Future Networks and Communications, FNC 2021. Verona, Italy: Elsevier, 2021, s. 264-271. ISSN 1877-0509. Dostupné z: https://dx.doi.org/10.1016/j.procs.2021.07.033.

    2020

    1. JANOVSKÝ, Adam, Matúš NEMEC, Petr ŠVENDA, Peter SEKAN a Václav MATYÁŠ. Biased RSA private keys: Origin attribution of GCD-factorable keys. In Liqun Chen and Ninghui Li and Kaitai Liang and Steve Schneider. Computer Security – ESORICS 2020. Cham, Switzerland: Springer, 2020, s. 505-524. ISBN 978-3-030-59012-3. Dostupné z: https://dx.doi.org/10.1007/978-3-030-59013-0_25.
    2. SEDLÁČEK, Vladimír, Ján JANČÁR a Petr ŠVENDA. Fooling primality tests on smartcards. In Liqun Chen, Ninghui Li, Kaitai Liang and Steve Schneider. 25th European Symposium on Research in Computer Security (ESORICS) 2020. Švýcarsko: Springer, 2020, s. 209-229. ISBN 978-3-030-59012-3. Dostupné z: https://dx.doi.org/10.1007/978-3-030-59013-0_11.
    3. CACCIA, M., L. MALINVERNO, L. PAOLUCCI, C. CORRIDORI, E. PROSERPIO, A. ABBA, A. CUSIMANO, W. KUCEWICZ, P. DOROSZ, M. BASZCZYK, M. ESPOSITO a Petr ŠVENDA. In-silico generation of random bit streams. Nuclear Instruments and Methods in Physics Research, Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. Amsterdam: Elsevier, 2020, roč. 980, č. 164480, s. 1-7. ISSN 0168-9002. Dostupné z: https://dx.doi.org/10.1016/j.nima.2020.164480.
    4. MAVROUDIS, Vasilios a Petr ŠVENDA. JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets. Online. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). Genoa, Italy: IEEE, 2020, s. 89-96. ISBN 978-1-7281-8597-2. Dostupné z: https://dx.doi.org/10.1109/EuroSPW51379.2020.00022.
    5. JANČÁR, Ján, Vladimír SEDLÁČEK, Petr ŠVENDA a Marek SÝS. Minerva: The curse of ECDSA nonces. Online. In Amir Moradi, Mehdi Tibouchi. IACR Transactions on Cryptographic Hardware and Embedded Systems. Německo: Ruhr-University of Bochum, 2020, s. 281-308. ISSN 2569-2925. Dostupné z: https://dx.doi.org/10.13154/tches.v2020.i4.281-308.

    2019

    1. SÝS, Marek, Dušan KLINEC, Karel KUBÍČEK a Petr ŠVENDA. BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256. In E-Business and Telecommunications 14th International Joint Conference, ICETE 2017. Madrid: Springer, 2019, s. 123-149. ISBN 978-3-030-11038-3. Dostupné z: https://dx.doi.org/10.1007/978-3-030-11039-0_7.
    2. OŠŤÁDAL, Radim, Václav MATYÁŠ, Petr ŠVENDA a Lukáš NĚMEC. Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensors. 2019, roč. 19, č. 22, s. 1-19. ISSN 1424-8220. Dostupné z: https://dx.doi.org/10.3390/s19225041.
    3. MRAZEK, Vojtech, Lukas SEKANINA, Roland DOBAI, Marek SÝS a Petr ŠVENDA. Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. IEEE, 2019, roč. 27, č. 12, s. 2734-2744. ISSN 1063-8210. Dostupné z: https://dx.doi.org/10.1109/TVLSI.2019.2923848.
    4. NĚMEC, Lukáš, Václav MATYÁŠ, Radim OŠŤÁDAL, Petr ŠVENDA a Pierre-Louis PALANT. Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks. Sensors. Basel: MDPI AG, 2019, roč. 19, č. 4, s. 1-15. ISSN 1424-8220. Dostupné z: https://dx.doi.org/10.3390/s19040914.
    5. SEDLÁČEK, Vladimír, Dušan KLINEC, Marek SÝS, Petr ŠVENDA a Václav MATYÁŠ. I want to break square-free: The 4p - 1 factorization method and its RSA backdoor viability. Online. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT. Prague, Czech Republic: SCITEPRESS, 2019, s. 25-36. ISBN 978-989-758-378-0. Dostupné z: https://dx.doi.org/10.5220/0007786600250036.

    2018

    1. NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ a Petr ŠVENDA. Adaptive Secrecy Amplification with Radio Channel Key Extraction. Online. In Lisa O’Conner. 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS). New York, NY, USA: IEEE, 2018, s. 123-130. ISBN 978-1-5386-5470-5. Dostupné z: https://dx.doi.org/10.1109/DCOSS.2018.00028.
    2. NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ a Petr ŠVENDA. Entropy crowdsourcing - protocols for link key updates in wireless sensor networks. In Security Protocols XXVI: 26th International Workshop. Cham, Switzerland: Springer International Publishing, 2018, s. 84-92. ISBN 978-3-030-03250-0. Dostupné z: https://dx.doi.org/10.1007/978-3-030-03251-7_9.
    3. MATYÁŠ, Václav, Petr ŠVENDA, Frank STAJANO, Bruce CHRISTIANSON a Jonathan ANDERSON. Security Protocols XXVI: 26th International Workshop. Cham: Springer, 2018. ISBN 978-3-030-03250-0. Dostupné z: https://dx.doi.org/10.1007/978-3-030-03251-7.

    2017

    1. MAVROUDIS, Vasilios, Andrea CERULLI, Petr ŠVENDA, Daniel CVRČEK, Dušan KLINEC a George DANEZIS. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. Online. In ACM. CCS '17: Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security. Dallas, TX, USA: ACM, 2017, s. 1583-1600. ISBN 978-1-4503-4946-8. Dostupné z: https://dx.doi.org/10.1145/3133956.3133961.
    2. NEMEC, Matúš, Dušan KLINEC, Petr ŠVENDA, Peter SEKAN a Václav MATYÁŠ. Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. Online. In Proceedings of the 33rd Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2017, s. 162-175. ISBN 978-1-4503-5345-8. Dostupné z: https://dx.doi.org/10.1145/3134600.3134612.
    3. OŠŤÁDAL, Radim, Petr ŠVENDA a Václav MATYÁŠ. Reconsidering Attacker Models in Ad-Hoc Networks. In J Anderson, V Matyáš, B Christianson, F Stajano. Security Protocols XXIV - 24th International Workshop. LNCS 10368. Heidelberg: Springer International Publishing AG, 2017, s. 219-227. ISBN 978-3-319-62032-9. Dostupné z: https://dx.doi.org/10.1007/978-3-319-62033-6_25.
    4. SÝS, Marek, Dušan KLINEC a Petr ŠVENDA. The Efficient Randomness Testing using Boolean Functions. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017. Madrid, Spain: SCITEPRESS, 2017, s. 92-103. ISBN 978-989-758-259-2. Dostupné z: https://dx.doi.org/10.5220/0006425100920103.
    5. NEMEC, Matúš, Marek SÝS, Petr ŠVENDA, Dušan KLINEC a Václav MATYÁŠ. The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. Online. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017, s. 1631-1648. ISBN 978-1-4503-4946-8. Dostupné z: https://dx.doi.org/10.1145/3133956.3133969.

    2016

    1. OŠŤÁDAL, Radim, Petr ŠVENDA a Václav MATYÁŠ. Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case. In International Conference on Cryptology and Network Security. Německo: Springer International Publishing, 2016, s. 552-561. ISBN 978-3-319-48964-3. Dostupné z: https://dx.doi.org/10.1007/978-3-319-48965-0_34.
    2. UKROP, Martin a Petr ŠVENDA. Avalanche Effect in Improperly Initialized CAESAR Candidates. Online. In Jan Bouda, Lukáš Holík, Jan Kofroň, Jan Strejček, Adam Rambousek. Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016. 233. vyd. Online: Open Publishing Association, 2016, s. 72-81. ISSN 2075-2180. Dostupné z: https://dx.doi.org/10.4204/EPTCS.233.7.
    3. KUBÍČEK, Karel, Jiří NOVOTNÝ, Petr ŠVENDA a Martin UKROP. New results on reduced-round Tiny Encryption Algorithm using genetic programming. Infocommunications Journal. Budapest: Scientific Association for Infocommunications, 2016, roč. 8, č. 1, s. 2-9. ISSN 2061-2079.
    4. ŠVENDA, Petr, Matúš NEMEC, Peter SEKAN, Rudolf KVAŠŇOVSKÝ, David FORMÁNEK, David KOMÁREK a Václav MATYÁŠ. The Million-Key Question – Investigating the Origins of RSA Public Keys. Online. In Thorsten Holz, Stefan Savage. Proceedings of 25th USENIX Security Symposium. Austin, Texas: USENIX Association, 2016, s. 893-910. ISBN 978-1-931971-32-4.

    2015

    1. CVRČEK, Daniel a Petr ŠVENDA. Architecture Considerations for Massively Parallel Hardware Security Platform. In Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth. Lecture Notes in Computer Science 9354. Berlin: Springer, 2015, s. 269-288. ISBN 978-3-319-24125-8. Dostupné z: https://dx.doi.org/10.1007/978-3-319-24126-5_16.
    2. BUKAČ, Vít, Radim OŠŤÁDAL, Petr ŠVENDA, Tatevik BAGHDASARYAN a Václav MATYÁŠ. Challenges of fiction in network security –perspective of virtualized environments. In Bruce Christianson et al. Security Protocols XXIII - 23rd International Workshop, Revised Selected Papers. Switzerland: Springer International Publishing, 2015, s. 145-151. ISBN 978-3-319-26095-2. Dostupné z: https://dx.doi.org/10.1007/978-3-319-26096-9_15.
    3. OŠŤÁDAL, Radim, Petr ŠVENDA a Václav MATYÁŠ. On Secrecy Amplification Protocols. In Raja Naeem Akram, Sushil Jajodia. Proceedings - Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015. LNCS 9311. Berlin: Springer International Publishing, 2015, s. 3-19. ISBN 978-3-319-24017-6. Dostupné z: https://dx.doi.org/10.1007/978-3-319-24018-3_1.
    4. CHRISTIANSON, Bruce, Petr ŠVENDA, Václav MATYÁŠ, James MALCOLM, Frank STAJANO a Jon ANDERSON. Security Protocols XXIII - 23rd International Workshop, Revised Selected Papers. In Lecture Notes in Computer Science 9379. Switzerland: Springer International Publishing, 2015, 358 s. ISBN 978-3-319-26095-2.
    5. MATYÁŠ, Václav, Petr ŠVENDA, Andriy STETSKO, Dušan KLINEC, Filip JURNEČKA a Martin STEHLÍK. WSNProtectLayer – security middleware for wireless sensor networks. In Al-Sakib Khan Pathan. Securing Cyber-Physical Systems. USA: CRC Press, 2015, s. 119-162. CRC Press. ISBN 978-1-4987-0098-6.

    2014

    1. OŠŤÁDAL, Radim, Petr ŠVENDA a Václav MATYÁŠ. A New Approach to Secrecy Amplification in Partially Compromised Networks. In Rajat Subhra Chakraborty. Security, Privacy, and Applied Cryptography Engineering - 4th International Conference. Heidelberg: Springer, 2014, s. 92-109. ISBN 978-3-319-12059-1. Dostupné z: https://dx.doi.org/10.1007/978-3-319-12060-7_7.
    2. SÝS, Marek, Petr ŠVENDA, Martin UKROP a Václav MATYÁŠ. Constructing empirical tests of randomness. In Mohammad S. Obaidat, Andreas Holzinger and Pierangela Samarati. SECRYPT 2014 Proceedings of the 11th International Conference on Security and Cryptography. Portugal: SCITEPRESS – Science and Technology Publications, 2014, s. 229-237. ISBN 978-989-758-045-1. Dostupné z: https://dx.doi.org/10.5220/0005023902290237.
    3. ŠVENDA, Petr, Martin UKROP a Václav MATYÁŠ. Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. In Mohammad S. Obaidat, Joaquim Filipe. E-Business and Telecommunications. Berlin: Springer Berlin Heidelberg, 2014, s. 290-305. ISBN 978-3-662-44787-1. Dostupné z: https://dx.doi.org/10.1007/978-3-662-44788-8_17.
    4. CHRISTIANSON, Bruce, James MALCOLM, Václav MATYÁŠ, Petr ŠVENDA, Frank STAJANO a Jon ANDERSON. Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. In Lecture Notes in Computer Science 8809. Heidelberg. Springer, 2014, 373 s. ISBN 978-3-319-12399-8.
    5. WSNProtectLayer (software)
      MATYÁŠ, Václav, Marcel GAZDÍK, Filip JURNEČKA, Dušan KLINEC, Jiří KŮR, Lukáš NĚMEC, Tobiáš SMOLKA, Martin STEHLÍK, Andriy STETSKO a Petr ŠVENDA. WSNProtectLayer. 2014.

    2013

    1. KŮR, Jiří, Václav MATYÁŠ a Petr ŠVENDA. Evolutionary Design of Attack Strategies. In Christianson, B., Malcolm, J. A., Matyáš, V., Roe, M. Security Protocols XVII - 17th International Workshop, Revised Selected Papers. Německo: Springer Verlag, 2013, s. 3-17. ISBN 978-3-642-36212-5. Dostupné z: https://dx.doi.org/10.1007/978-3-642-36213-2_2.
    2. ŠVENDA, Petr a Václav MATYÁŠ. On the Origin of Yet another Channel. In B. Christianson, J. Malcolm, F. Stajano, J. Anderson, J. Bonneau. Proceedings of Security Protocols XXI. Berlin: Springer, 2013, s. 223-237. ISBN 978-3-642-41716-0. Dostupné z: https://dx.doi.org/10.1007/978-3-642-41717-7_26.
    3. ŠVENDA, Petr a Martin HANZAL. Studie s návrhem bezpečnostní architektury pro úložiště dat. Brno: SODATSW s.r.o., 2013, 9 s.
    4. ŠVENDA, Petr, Martin UKROP a Václav MATYÁŠ. Towards cryptographic function distinguishers with evolutionary circuits. In Pierangela Samarati. Proceedings of SECRYPT 2013, 10th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2013, s. 135-146. ISBN 978-989-8565-73-0.
    5. KLINEC, Dušan a Petr ŠVENDA. White-Box AES implementation in Java. 2013.
    6. KLINEC, Dušan a Petr ŠVENDA. White-Box Cryptography. In Vladimír Rudolf. Sborník příspěvků 43. konference Europen. 1. vyd. Plzeň: Ing. Miloš Brejcha Vydavatelský servis, Plzeň, 2013, s. 45-58. ISBN 978-80-86583-26-6.

    2012

    1. SMOLKA, Tobiáš, Petr ŠVENDA, Lukáš SEKANINA a Václav MATYÁŠ. Evolutionary Design of Message Efficient Secrecy Amplification Protocols. In Alberto Moraglio, Sara Silva, Krzysztof Krawiec, Penousal Machado, Carlos Cotta. LNCS 7244, Proceedings of the 15th European Conference on Genetic Programming, EuroGP 2012. Berlin: Springer Verlag, 2012, s. 194-205. ISBN 978-3-642-29138-8. Dostupné z: https://dx.doi.org/10.1007/978-3-642-29139-5_17.
    2. KŮR, Jiří, Václav MATYÁŠ a Petr ŠVENDA. Two Improvements of Random Key Predistribution for Wireless Sensor Networks - Revised Version. Infocommunications Journal. Budapest, Hungary: Scientific Association for Infocommunica, 2012, IV, č. 4, s. 28-35. ISSN 2061-2079.

    2011

    1. APDUPlay 1.0 (software)
      ŠVENDA, Petr. APDUPlay 1.0. 2011.
    2. KŮR, Jiří, Václav MATYÁŠ, Andriy STETSKO a Petr ŠVENDA. Attack Detection vs. Privacy - How to Find the Link or How to Hide it? In B. Christianson et al. Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers. Neuveden: Springer Heidelberg Dordrecht London New York, 2011, s. 189-199. ISBN 978-3-642-25866-4. Dostupné z: https://dx.doi.org/10.1007/978-3-642-25867-1_18.
    3. HANÁČEK, Petr a Petr ŠVENDA. Cryptography for (partially) compromised sensor networks. In Eva Racková. Information Security Summit - Crisis Plans and Security. Praha: DSM - data security management, 2011, s. 102-118. ISBN 978-80-86813-22-6.
    4. KÖPSELL, Stefan a Petr ŠVENDA. Law enforcement and data retention in the light of an anonymisation services. Masaryk University Journal of Law and Technology. Brno: Masarykova univerzita, 2011, roč. 2/2011, Fall, s. 305-320. ISSN 1802-5951.

    2010

    1. LORENC, Václav, Tobiáš SMOLKA a Petr ŠVENDA. Automatic source code transformations for strengthening practical security of smart card applications. In Sborník příspěvků z 36. konference EurOpen.CZ. Plzeň: EurOpen.CZ, 2010, s. 93-115, 118 s. ISBN 978-80-86583-19-8.
    2. KŮR, Jiří, Tobiáš SMOLKA a Petr ŠVENDA. CesTa k ochraně čipových karet. Data Security Management. Praha: Tate International, 2010, roč. 14, č. 4, s. 14-17. ISSN 1211-8737.
    3. SEKANINA, Lukáš a Petr ŠVENDA. Evoluční návrh protokolů pro amplifikaci bezpečnosti. In Evoluční hardware. Praha: Academia, 2010, s. 298-315, 17 s. Gerstner. ISBN 978-80-200-1729-1.
    4. KÖPSELL, Stefan a Petr ŠVENDA. Secure Logging of Retained Data for an Anonymity Service. In M. Bessi et al. Privacy and Identity Management for Life. Berlin: Springer, 2010, s. 284-296, 15 s. ISBN 978-3-642-14281-9. Dostupné z: https://dx.doi.org/10.1007/978-3-642-14282-6_24.

    2009

    1. ŠVENDA, Petr a Václav MATYÁŠ. Authenticated Key Exchange with Group Support for Wireless Sensor Networks. In From Problem to Solution: Wireless Sensor Networks Security. New York, USA: Nova Science Publishers, 2009, s. 285-311, 23 s. Distributed, Cluster and Grid Computing book serie. ISBN 978-1-60456-457-0.
    2. ŠVENDA, Petr, Lukáš SEKANINA a Václav MATYÁŠ. Evolutionary Design of Secrecy Amplification Protocols for Wireless Sensor Networks. In Proceedings of the second ACM conference on Wireless network security. New York, NY, USA: ACM, 2009, s. 225-236, 268 s. ISBN 978-1-60558-460-7.
    3. KŮR, Jiří, Tobiáš SMOLKA a Petr ŠVENDA. Improving Resiliency of JavaCard Code Against Power Analysis. In Santa's Crypto Get-Together 2009. 1. vyd. Bílovice nad Svitavou: Trusted Network Solutions, 2009, s. 29-39. ISBN 978-80-904257-0-5.
    4. MATYÁŠ, Václav, Simone FISCHER-HUBNER, Daniel CVRČEK a Petr ŠVENDA. The Future of Identity in the Information Society 4th IFIP / FIDIS International Summer School. In The Future of Identity in the Information Society 4th IFIP / FIDIS International Summer School. Heidelberg, SRN: Springer Verlag, 2009, 281 s. ISBN 978-3-642-03314-8.
    5. BOUDA, Jan, Jan KRHOVJÁK, Václav MATYÁŠ a Petr ŠVENDA. Towards True Random Number Generation in Mobile Environments. In LNCS 5838, Identity and Privacy in the Internet Age. 5838/2009. Berlin: Springer, 2009, s. 179-189, 12 s. ISBN 978-3-642-04765-7. Dostupné z: https://dx.doi.org/10.1007/978-3-642-04766-4_13.

    2008

    1. MATYÁŠ, Václav (Vašek) a Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů. 1. vyd. Brno: Masarykova univerzita, 2008, 128 s. 1. ISBN 978-80-210-4556-9.
    2. MATYÁŠ, Václav, Zdeněk ŘÍHA a Petr ŠVENDA. La seguridad de los pasaportes electrónicos. Novática. Madrid: Asociación de Técnicos de Informática, 2008, XXXIV, č. 195, s. 60-66. ISSN 0211-2124.

    2007

    1. MATYÁŠ, Václav, Jan KRHOVJÁK, Václav LORENC, Marek KUMPOŠT, Zdeněk ŘÍHA, Daniel CVRČEK, Jan STAUDEK, Pavel HENDRYCH, Miroslav JANDA, Vlastimil HOLER, Kamil MALINKA, Petr ŠVENDA a Andriy STETSKO. Autentizace uživatelů a autorizace elektronických transakcí. Praha: TATE International, s.r.o., 2007, 318 s. Příručka manažera VIII. ISBN 978-80-86813-14-1.
    2. ŠVENDA, Petr a Václav MATYÁŠ. Authenticated Key Exchange with Group Support for Wireless Sensor Networks. In The 3rd Wireless and Sensor Network Security Workshop; 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems. IEEE Computer Society Press. Los Alamitos, CA: IEEE Computer Society Press, 2007, s. 21-26, 62 s. ISBN 1-4244-1455-5.
    3. ŠVENDA, Petr. Automatic Construction of Secrecy Amplification Protocols. In MEMICS 2007 Proceedings. Brno: Ing. Zdeněk Novotný CSc., 2007, s. 209-216, 264 s. ISBN 978-80-7355-077-6.
    4. ŠVENDA, Petr, Václav MATYÁŠ a Jiří KŮR. Santa's Crypto Get-Together 2007. 1. vyd. Praha: Trusted Network Solutions, 2007, 89 s. ISBN 80-903083-8-4.
    5. ŘÍHA, Zdeněk, Václav MATYÁŠ a Petr ŠVENDA. Security of Electronic Passports. The European Journal for the Informatics Professional. 2007, VIIII, č. 6, s. 60-67. ISSN 1684-5285.
    6. KRHOVJÁK, Jan, Petr ŠVENDA a Václav MATYÁŠ. The Sources of Randomness in Mobile Devices. In Proceeding of the 12th Nordic Workshop on Secure IT Systems. Kringlan 1, 103 Reykjavik: Reykjavik University, 2007, s. 73-84, 163 s. ISBN 978-9979948346.
    7. KRHOVJÁK, Jan, Petr ŠVENDA, Václav MATYÁŠ a Luděk SMOLÍK. The Sources of Randomness in Smartphones with Symbian OS. In Security and Protection of Information 2007. Brno: University of Defence, 2007, s. 87-98. ISBN 978-80-7231-230-6.

    2006

    1. ŠVENDA, Petr. Authenticated Key Exchange with Group Support for Wireless Sensor Networks. 2006. vyd. Brno: FIT VUT, 2006, 267 s. ISBN 80-214-3287-X.
    2. KRHOVJÁK, Jan, Petr ŠVENDA a Václav MATYÁŠ. Generování náhodných dat v mobilních zařízeních. DSM. Praha: Tate International, s.r.o., 2006, X, č. 6, s. 30-34. ISSN 1211-8737.
    3. ŘÍHA, Zdeněk, Václav MATYÁŠ ML., Petr ŠVENDA a Daniel CVRČEK. Mikulášská kryptobesídka 2001-2005. 2006.
    4. MATYÁŠ, Václav, Daniel CVRČEK a Petr ŠVENDA. Mikulášská kryptobesídka 2006. 2006.

    2005

    1. ŠVENDA, Petr a Martin OSOVSKÝ. Forward Onion Encryption Scheme for Wireless Sensor Networks. In 1st Doctoral Workshop on Mathematical and Engineering Methods in Computer Science. Zlin, 2005, s. 38-44, 224 s.
    2. CVRČEK, Daniel a Petr ŠVENDA. Smart dust security - key infection revisited. In International Workshop on Security and Trust Management 2005, ENTCS Vol. 157. Milan, Italy, 2005, s. 10-23.
    3. ŠVENDA, Petr. Srovnání protokolů pro "Remotely Keyed Encryption". In Santa's Crypto Get-Together, Sborník příspěvků. Praha, 2005, s. 25-37, 80 s. ISBN 978-80-903.

    2004

    1. ŠVENDA, Petr. Implementace kryptografického protokolu s využitím mobilní kryptografie. In Sborník Mikulášské kryptobesídky 2004. 2004, s. 29-40, 11 s. ISBN 80-903083-4-1.
    2. ŠVENDA, Petr a Václav MATYÁŠ ML. Zvýšení bezpečnosti běhu softwarových aplikací pomocí kryptografické čipové karty. In Sbornik Europen XXV. Praha: EurOpen.CZ, 2004, s. 127-148. ISBN 80-86583-07-4.
Zobrazit podrobně
Zobrazeno: 5. 12. 2024 01:38