Masaryk University

Publication Records

česky | in English

Filter publications

    2019

  1. SÝS, Marek, Dušan KLINEC, Karel KUBÍČEK and Petr ŠVENDA. BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256. E-Business and Telecommunications, 2019, 990/2019, No 990, p. 123-149. ISSN 1865-0929. doi:10.1007/978-3-030-11039-0.
  2. NĚMEC, Lukáš, Václav MATYÁŠ, Radim OŠŤÁDAL, Petr ŠVENDA and Pierre-Louis PALANT. Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks. Sensors, Basel: MDPI AG, 2019, vol. 19, No 4, p. 1-15. ISSN 1424-8220. doi:10.3390/s19040914.
  3. 2018

  4. NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ and Petr ŠVENDA. Adaptive Secrecy Amplification with Radio Channel Key Extraction (Adaptive secrecy amplification with radio channel key extraction). In Lisa O’Conner. 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS). New York, NY, USA: IEEE, 2018. p. 123-130, 8 pp. ISSN 2325-2944. doi:10.1109/DCOSS.2018.00028.
  5. NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ and Petr ŠVENDA. Entropy crowdsourcing - protocols for link key updates in wireless sensor networks. In Security Protocols XXVI: 26th International Workshop. Cham, Switzerland: Springer International Publishing, 2018. p. 84-92, 9 pp. ISBN 978-3-030-03250-0. doi:10.1007/978-3-030-03251-7_9.
  6. MATYÁŠ, Václav, Petr ŠVENDA, Frank STAJANO, Bruce CHRISTIANSON and Jonathan ANDERSON. Security Protocols XXVI: 26th International Workshop. Cham: Springer, 2018. ISBN 978-3-030-03250-0. doi:10.1007/978-3-030-03251-7.
  7. 2017

  8. MAVROUDIS, Vasilios, Andrea CERULLI, Petr ŠVENDA, Daniel CVRČEK, Dušan KLINEC and George DANEZIS. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. In ACM. CCS '17: Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security. Dallas, TX, USA: ACM, 2017. p. 1583-1600, 18 pp. ISBN 978-1-4503-4946-8. doi:10.1145/3133956.3133961.
  9. NEMEC, Matúš, Dušan KLINEC, Petr ŠVENDA, Peter SEKAN and Václav MATYÁŠ. Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. In Proceedings of the 33rd Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2017. p. 162-175, 14 pp. ISBN 978-1-4503-5345-8. doi:10.1145/3134600.3134612.
  10. OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. Reconsidering Attacker Models in Ad-Hoc Networks. In J Anderson, V Matyáš, B Christianson, F Stajano. Security Protocols XXIV - 24th International Workshop. LNCS 10368. Heidelberg: Springer International Publishing AG, 2017. p. 219-227, 9 pp. ISBN 978-3-319-62032-9. doi:10.1007/978-3-319-62033-6_25.
  11. SÝS, Marek, Dušan KLINEC and Petr ŠVENDA. The Efficient Randomness Testing using Boolean Functions. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017. Madrid, Spain: SCITEPRESS, 2017. p. 92-103, 12 pp. ISBN 978-989-758-259-2. doi:10.5220/0006425100920103.
  12. NEMEC, Matúš, Marek SÝS, Petr ŠVENDA, Dušan KLINEC and Václav MATYÁŠ. The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. p. 1631-1648, 18 pp. ISBN 978-1-4503-4946-8. doi:10.1145/3133956.3133969.
  13. 2016

  14. OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case. In International Conference on Cryptology and Network Security. Německo: Springer International Publishing, 2016. p. 552-561, 10 pp. ISBN 978-3-319-48964-3. doi:10.1007/978-3-319-48965-0_34.
  15. UKROP, Martin and Petr ŠVENDA. Avalanche Effect in Improperly Initialized CAESAR Candidates. In Jan Bouda, Lukáš Holík, Jan Kofroň, Jan Strejček, Adam Rambousek. Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016. 233. vyd. Online: Open Publishing Association, 2016. p. 72-81, 10 pp. ISSN 2075-2180. doi:10.4204/EPTCS.233.7.
  16. KUBÍČEK, Karel, Jiří NOVOTNÝ, Petr ŠVENDA and Martin UKROP. New results on reduced-round Tiny Encryption Algorithm using genetic programming. Infocommunications Journal, Budapest: Scientific Association for Infocommunications, 2016, vol. 8, No 1, p. 2-9. ISSN 2061-2079.
  17. ŠVENDA, Petr, Matúš NEMEC, Peter SEKAN, Rudolf KVAŠŇOVSKÝ, David FORMÁNEK, David KOMÁREK and Václav MATYÁŠ. The Million-Key Question – Investigating the Origins of RSA Public Keys. In Thorsten Holz, Stefan Savage. Proceedings of 25th USENIX Security Symposium. Austin, Texas: USENIX Association, 2016. p. 893-910, 18 pp. ISBN 978-1-931971-32-4.
  18. 2015

  19. CVRČEK, Daniel and Petr ŠVENDA. Architecture Considerations for Massively Parallel Hardware Security Platform. In Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth. Lecture Notes in Computer Science 9354. Berlin: Springer, 2015. p. 269-288, 20 pp. ISBN 978-3-319-24125-8. doi:10.1007/978-3-319-24126-5_16.
  20. BUKAČ, Vít, Radim OŠŤÁDAL, Petr ŠVENDA, Tatevik BAGHDASARYAN and Václav MATYÁŠ. Challenges of fiction in network security –perspective of virtualized environments. In Bruce Christianson et al.. Security Protocols XXIII - 23rd International Workshop, Revised Selected Papers. Switzerland: Springer International Publishing, 2015. p. 145-151, 7 pp. ISBN 978-3-319-26095-2. doi:10.1007/978-3-319-26096-9_15.
  21. OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. On Secrecy Amplification Protocols. In Raja Naeem Akram, Sushil Jajodia. Proceedings - Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015. LNCS 9311. Berlin: Springer International Publishing, 2015. p. 3-19, 17 pp. ISBN 978-3-319-24017-6. doi:10.1007/978-3-319-24018-3_1.
  22. CHRISTIANSON, Bruce, Petr ŠVENDA, Václav MATYÁŠ, James MALCOLM, Frank STAJANO and Jon ANDERSON. Security Protocols XXIII - 23rd International Workshop, Revised Selected Papers. In Lecture Notes in Computer Science 9379. Switzerland: Springer International Publishing, 2015. 358 pp. ISBN 978-3-319-26095-2.
  23. MATYÁŠ, Václav, Petr ŠVENDA, Andriy STETSKO, Dušan KLINEC, Filip JURNEČKA and Martin STEHLÍK. WSNProtectLayer – security middleware for wireless sensor networks. In Al-Sakib Khan Pathan. Securing Cyber-Physical Systems. USA: CRC Press, 2015. p. 119-162, 44 pp. CRC Press. ISBN 978-1-4987-0098-6.
  24. 2014

  25. OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. A New Approach to Secrecy Amplification in Partially Compromised Networks. In Rajat Subhra Chakraborty. Security, Privacy, and Applied Cryptography Engineering - 4th International Conference. Heidelberg: Springer, 2014. p. 92-109, 18 pp. ISBN 978-3-319-12059-1. doi:10.1007/978-3-319-12060-7_7.
  26. SÝS, Marek, Petr ŠVENDA, Martin UKROP and Václav MATYÁŠ. Constructing empirical tests of randomness. In Mohammad S. Obaidat, Andreas Holzinger and Pierangela Samarati. SECRYPT 2014 Proceedings of the 11th International Conference on Security and Cryptography. Portugal: SCITEPRESS – Science and Technology Publications, 2014. p. 229-237, 9 pp. ISBN 978-989-758-045-1. doi:10.5220/0005023902290237.
  27. ŠVENDA, Petr, Martin UKROP and Václav MATYÁŠ. Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. In Mohammad S. Obaidat, Joaquim Filipe. E-Business and Telecommunications. Berlin: Springer Berlin Heidelberg, 2014. p. 290-305, 16 pp. ISBN 978-3-662-44787-1. doi:10.1007/978-3-662-44788-8_17.
  28. CHRISTIANSON, Bruce, James MALCOLM, Václav MATYÁŠ, Petr ŠVENDA, Frank STAJANO and Jon ANDERSON. Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. In Lecture Notes in Computer Science 8809. Heidelberg. : Springer, 2014. 373 pp. ISBN 978-3-319-12399-8.
  29. WSNProtectLayer (software)
    MATYÁŠ, Václav, Marcel GAZDÍK, Filip JURNEČKA, Dušan KLINEC, Jiří KŮR, Lukáš NĚMEC, Tobiáš SMOLKA, Martin STEHLÍK, Andriy STETSKO and Petr ŠVENDA. WSNProtectLayer. 2014.
  30. 2013

  31. KŮR, Jiří, Václav MATYÁŠ and Petr ŠVENDA. Evolutionary Design of Attack Strategies. In Christianson, B., Malcolm, J. A., Matyáš, V., Roe, M.. Security Protocols XVII - 17th International Workshop, Revised Selected Papers. Německo: Springer Verlag, 2013. p. 3-17, 15 pp. ISBN 978-3-642-36212-5. doi:10.1007/978-3-642-36213-2_2.
  32. ŠVENDA, Petr and Václav MATYÁŠ. On the Origin of Yet another Channel. In B. Christianson, J. Malcolm, F. Stajano, J. Anderson, J. Bonneau. Proceedings of Security Protocols XXI. Berlin: Springer, 2013. p. 223-237, 15 pp. ISBN 978-3-642-41716-0. doi:10.1007/978-3-642-41717-7_26.
  33. ŠVENDA, Petr and Martin HANZAL. Studie s návrhem bezpečnostní architektury pro úložiště dat (Design of security architecture for remote storage of sensitive data). Brno: SODATSW s.r.o., 2013. 9 pp.
  34. ŠVENDA, Petr, Martin UKROP and Václav MATYÁŠ. Towards cryptographic function distinguishers with evolutionary circuits. In Pierangela Samarati. Proceedings of SECRYPT 2013, 10th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2013. p. 135-146, 12 pp. ISBN 978-989-8565-73-0.
  35. KLINEC, Dušan and Petr ŠVENDA. White-Box AES implementation in Java. 2013.
  36. KLINEC, Dušan and Petr ŠVENDA. White-Box Cryptography. In Vladimír Rudolf. Sborník příspěvků 43. konference Europen. 1. vyd. Plzeň: Ing. Miloš Brejcha Vydavatelský servis, Plzeň, 2013. p. 45-58, 14 pp. ISBN 978-80-86583-26-6.
  37. 2012

  38. SMOLKA, Tobiáš, Petr ŠVENDA, Lukáš SEKANINA and Václav MATYÁŠ. Evolutionary Design of Message Efficient Secrecy Amplification Protocols. In Alberto Moraglio, Sara Silva, Krzysztof Krawiec, Penousal Machado, Carlos Cotta. LNCS 7244, Proceedings of the 15th European Conference on Genetic Programming, EuroGP 2012. Berlin: Springer Verlag, 2012. p. 194-205, 12 pp. ISBN 978-3-642-29138-8. doi:10.1007/978-3-642-29139-5_17.
  39. KŮR, Jiří, Václav MATYÁŠ and Petr ŠVENDA. Two Improvements of Random Key Predistribution for Wireless Sensor Networks - Revised Version. Infocommunications Journal, Budapest, Hungary: Scientific Association for Infocommunica, 2012, IV, No 4, p. 28-35. ISSN 2061-2079.
  40. 2011

  41. KŮR, Jiří, Václav MATYÁŠ, Andriy STETSKO and Petr ŠVENDA. Attack Detection vs. Privacy - How to Find the Link or How to Hide it? In B. Christianson et al.. Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers. Neuveden: Springer Heidelberg Dordrecht London New York, 2011. p. 189-199, 11 pp. ISBN 978-3-642-25866-4. doi:10.1007/978-3-642-25867-1_18.
  42. HANÁČEK, Petr and Petr ŠVENDA. Cryptography for (partially) compromised sensor networks. In Eva Racková. Information Security Summit - Crisis Plans and Security. Praha: DSM - data security management, 2011. p. 102-118, 17 pp. ISBN 978-80-86813-22-6.
  43. KÖPSELL, Stefan and Petr ŠVENDA. Law enforcement and data retention in the light of an anonymisation services. Masaryk University Journal of Law and Technology, Brno: Masarykova univerzita, 2011, 2/2011, Fall, p. 305-320. ISSN 1802-5951.
  44. 2010

  45. LORENC, Václav, Tobiáš SMOLKA and Petr ŠVENDA. Automatic source code transformations for strengthening practical security of smart card applications. In Sborník příspěvků z 36. konference EurOpen.CZ. Plzeň: EurOpen.CZ, 2010. p. 93-115, 118 pp. ISBN 978-80-86583-19-8.
  46. KŮR, Jiří, Tobiáš SMOLKA and Petr ŠVENDA. CesTa k ochraně čipových karet (Towards secure smart cards). Data Security Management, Praha: Tate International, 2010, roč. 14, No 4, p. 14-17. ISSN 1211-8737.
  47. SEKANINA, Lukáš and Petr ŠVENDA. Evoluční návrh protokolů pro amplifikaci bezpečnosti (Evolutionary Design of Secrecy Amplification Protocols). In Evoluční hardware. Praha: Academia, 2010. p. 298-315, 17 pp. Gerstner. ISBN 978-80-200-1729-1.
  48. KÖPSELL, Stefan and Petr ŠVENDA. Secure Logging of Retained Data for an Anonymity Service. In M. Bessi et al.. Privacy and Identity Management for Life. Berlin: Springer, 2010. p. 284-296, 15 pp. ISBN 978-3-642-14281-9. doi:10.1007/978-3-642-14282-6_24.
  49. 2009

  50. ŠVENDA, Petr and Václav MATYÁŠ. Authenticated Key Exchange with Group Support for Wireless Sensor Networks. In From Problem to Solution: Wireless Sensor Networks Security. New York, USA: Nova Science Publishers, 2009. p. 285-311, 23 pp. Distributed, Cluster and Grid Computing book serie. ISBN 978-1-60456-457-0.
  51. ŠVENDA, Petr, Lukáš SEKANINA and Václav MATYÁŠ. Evolutionary Design of Secrecy Amplification Protocols for Wireless Sensor Networks. In Proceedings of the second ACM conference on Wireless network security. New York, NY, USA: ACM, 2009. p. 225-236, 268 pp. ISBN 978-1-60558-460-7.
  52. KŮR, Jiří, Tobiáš SMOLKA and Petr ŠVENDA. Improving Resiliency of JavaCard Code Against Power Analysis. In Santa's Crypto Get-Together 2009. 1. vyd. Bílovice nad Svitavou: Trusted Network Solutions, 2009. p. 29-39. ISBN 978-80-904257-0-5.
  53. MATYÁŠ, Václav, Simone FISCHER-HUBNER, Daniel CVRČEK and Petr ŠVENDA. The Future of Identity in the Information Society 4th IFIP / FIDIS International Summer School. In The Future of Identity in the Information Society 4th IFIP / FIDIS International Summer School. Heidelberg, SRN: Springer Verlag, 2009. 281 pp. ISBN 978-3-642-03314-8.
  54. BOUDA, Jan, Jan KRHOVJÁK, Václav MATYÁŠ and Petr ŠVENDA. Towards True Random Number Generation in Mobile Environments. In LNCS 5838, Identity and Privacy in the Internet Age. 5838/2009. Berlin: Springer, 2009. p. 179-189, 12 pp. ISBN 978-3-642-04765-7. doi:10.1007/978-3-642-04766-4_13.
  55. 2008

  56. MATYÁŠ, Václav (Vašek) and Jan KRHOVJÁK. Autorizace elektronických transakcí a autentizace dat i uživatelů (User authentication and electronic transaction authorization). 1. vyd. Brno: Masarykova univerzita, 2008. 128 pp. 1. ISBN 978-80-210-4556-9.
  57. MATYÁŠ, Václav, Zdeněk ŘÍHA and Petr ŠVENDA. La seguridad de los pasaportes electrónicos (Security of electronic passports). Novática, Madrid: Asociación de Técnicos de Informática, 2008, XXXIV, No 195, p. 60-66. ISSN 0211-2124.
  58. 2007

  59. MATYÁŠ, Václav, Jan KRHOVJÁK, Václav LORENC, Marek KUMPOŠT, Zdeněk ŘÍHA, Daniel CVRČEK, Jan STAUDEK, Pavel HENDRYCH, Miroslav JANDA, Vlastimil HOLER, Kamil MALINKA, Petr ŠVENDA and Andriy STETSKO. Autentizace uživatelů a autorizace elektronických transakcí (User authentication and electronic transaction authorization). Praha: TATE International, s.r.o., 2007. 318 pp. Příručka manažera VIII. ISBN 978-80-86813-14-1.
  60. ŠVENDA, Petr and Václav MATYÁŠ. Authenticated Key Exchange with Group Support for Wireless Sensor Networks. In The 3rd Wireless and Sensor Network Security Workshop; 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems. IEEE Computer Society Press. Los Alamitos, CA: IEEE Computer Society Press, 2007. p. 21-26, 62 pp. ISBN 1-4244-1455-5.
  61. ŠVENDA, Petr. Automatic Construction of Secrecy Amplification Protocols. In MEMICS 2007 Proceedings. Brno: Ing. Zdeněk Novotný CSc., 2007. p. 209-216, 264 pp. ISBN 978-80-7355-077-6.
  62. ŠVENDA, Petr, Václav MATYÁŠ and Jiří KŮR. Santa's Crypto Get-Together 2007. 1. vyd. Praha: Trusted Network Solutions, 2007. 89 pp. ISBN 80-903083-8-4.
  63. ŘÍHA, Zdeněk, Václav MATYÁŠ and Petr ŠVENDA. Security of Electronic Passports. The European Journal for the Informatics Professional, 2007, VIIII, No 6, p. 60-67. ISSN 1684-5285.
  64. KRHOVJÁK, Jan, Petr ŠVENDA and Václav MATYÁŠ. The Sources of Randomness in Mobile Devices. In Proceeding of the 12th Nordic Workshop on Secure IT Systems. Kringlan 1, 103 Reykjavik: Reykjavik University, 2007. p. 73-84, 163 pp. ISBN 978-9979948346.
  65. KRHOVJÁK, Jan, Petr ŠVENDA, Václav MATYÁŠ and Luděk SMOLÍK. The Sources of Randomness in Smartphones with Symbian OS. In Security and Protection of Information 2007. Brno: University of Defence, 2007. p. 87-98, 12 pp. ISBN 978-80-7231-230-6.
  66. 2006

  67. ŠVENDA, Petr. Authenticated Key Exchange with Group Support for Wireless Sensor Networks. 2006. vyd. Brno: FIT VUT, 2006. 267 pp. ISBN 80-214-3287-X.
  68. KRHOVJÁK, Jan, Petr ŠVENDA and Václav MATYÁŠ. Generování náhodných dat v mobilních zařízeních (Random number generation in mobile devices). DSM, Praha: Tate International, s.r.o., 2006, X, No 6, p. 30-34. ISSN 1211-8737.
  69. ŘÍHA, Zdeněk, Václav MATYÁŠ ML., Petr ŠVENDA and Daniel CVRČEK. Mikulášská kryptobesídka 2001-2005 (Santa's Crypto Get-Together 2001-2005). 2006.
  70. MATYÁŠ, Václav, Daniel CVRČEK and Petr ŠVENDA. Mikulášská kryptobesídka 2006 (Santa's Crypto Get-Together 2006). 2006.
  71. 2005

  72. ŠVENDA, Petr and Martin OSOVSKÝ. Forward Onion Encryption Scheme for Wireless Sensor Networks. In 1st Doctoral Workshop on Mathematical and Engineering Methods in Computer Science. Zlin, 2005. p. 38-44, 224 pp.
  73. CVRČEK, Daniel and Petr ŠVENDA. Smart dust security - key infection revisited. In International Workshop on Security and Trust Management 2005, ENTCS Vol. 157. Milan, Italy, 2005. p. 10-23.
  74. ŠVENDA, Petr. Srovnání protokolů pro "Remotely Keyed Encryption" (Comparison of protocols for Remotely Keyed Encryption). In Santa's Crypto Get-Together, Sborník příspěvků. Praha, 2005. p. 25-37, 80 pp. ISBN 978-80-903.
  75. 2004

  76. ŠVENDA, Petr. Implementace kryptografického protokolu s využitím mobilní kryptografie (Cryptographic Protocol Implementation using Mobile Cryptography). In Sborník Mikulášské kryptobesídky 2004. 2004. p. 29-40, 11 pp. ISBN 80-903083-4-1.
  77. ŠVENDA, Petr and Václav MATYÁŠ ML. Zvýšení bezpečnosti běhu softwarových aplikací pomocí kryptografické čipové karty (Improving software application security using cryptographic smartcard). In Sbornik Europen XXV. Praha: EurOpen.CZ, 2004. p. 127-148, 22 pp. ISBN 80-86583-07-4.
Display details
Displayed: 23. 3. 2019 16:08