-
Revisiting the analysis of references among Common Criteria certified products J - Článek v odborném periodikuJANOVSKÝ, Adam; Lukasz Michal CHMIELEWSKI; Petr ŠVENDA; Ján JANČÁR a Václav MATYÁŠ. Revisiting the analysis of references among Common Criteria certified products. Computers & Security. 2025, roč. 152, č. 104362, s. 1-10. ISSN 0167-4048. Dostupné z: https://doi.org/10.1016/j.cose.2025.104362.Podrobněji: https://is.muni.cz/publication/2474337/cs
-
Chain of Trust: Unraveling References Among Common Criteria Certified Products D - Stať ve sborníkuJANOVSKÝ, Adam; Lukasz Michal CHMIELEWSKI; Petr ŠVENDA; Ján JANČÁR a Václav MATYÁŠ. Chain of Trust: Unraveling References Among Common Criteria Certified Products. Online. In Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis. ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology. volume 710. Cham: Springer Nature Switzerland, 2024, s. 191-205. ISBN 978-3-031-65174-8. Dostupné z: https://doi.org/10.1007/978-3-031-65175-5_14.Podrobněji: https://is.muni.cz/publication/2420157/cs
-
sec-certs: Examining the security certification practice for better vulnerability mitigation J - Článek v odborném periodikuJANOVSKÝ, Adam; Ján JANČÁR; Petr ŠVENDA; Lukasz Michal CHMIELEWSKI; Jiří MICHALÍK a Václav MATYÁŠ. sec-certs: Examining the security certification practice for better vulnerability mitigation. Computers & Security. 2024, roč. 143, č. 103895, s. 1-13. ISSN 0167-4048. Dostupné z: https://doi.org/10.1016/j.cose.2024.103895.Podrobněji: https://is.muni.cz/publication/2418937/cs
-
Explaining the Use of Cryptographic API in Android Malware D - Stať ve sborníkuJANOVSKÝ, Adam; Davide MAIORCA; Dominik MACKO; Václav MATYÁŠ a Giorgio GIACINTO. Explaining the Use of Cryptographic API in Android Malware. Online. In Van Sinderen, M., Wijnhoven, F., Hammoudi, S., Samarati, P., Vimercati. E-Business and Telecommunications. Cham: Springer Nature Switzerland, 2023, s. 69-97. ISBN 978-3-031-45136-2. Dostupné z: https://doi.org/10.1007/978-3-031-45137-9_4.Podrobněji: https://is.muni.cz/publication/2323657/cs
-
A Longitudinal Study of Cryptographic API: a Decade of Android Malware D - Stať ve sborníkuJANOVSKÝ, Adam; Davide MAIORCA; Dominik MACKO; Václav MATYÁŠ a Giorgio GIACINTO. A Longitudinal Study of Cryptographic API: a Decade of Android Malware. In Sabrina De Capitani di Vimercati and Pierangela Samarati. Proceedings of the 19th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2022, s. 121-133. ISBN 978-989-758-590-6. Dostupné z: https://doi.org/10.5220/0011265300003283.Podrobněji: https://is.muni.cz/publication/1874340/cs
-
Analysis of cryptographic implementations, Intermediate report fo progress for NUKIB, CRoCS@FI Masaryk Univerzity A - Audiovizuální tvorbaŠVENDA, Petr a Adam JANOVSKÝ. Analysis of cryptographic implementations, Intermediate report fo progress for NUKIB, CRoCS@FI Masaryk Univerzity. 2022.Podrobněji: https://is.muni.cz/publication/1874360/cs
-
Biased RSA private keys: Origin attribution of GCD-factorable keys D - Stať ve sborníkuJANOVSKÝ, Adam; Matúš NEMEC; Petr ŠVENDA; Peter SEKAN a Václav MATYÁŠ. Biased RSA private keys: Origin attribution of GCD-factorable keys. In Liqun Chen and Ninghui Li and Kaitai Liang and Steve Schneider. Computer Security – ESORICS 2020. Cham, Switzerland: Springer, 2020, s. 505-524. ISBN 978-3-030-59012-3. Dostupné z: https://doi.org/10.1007/978-3-030-59013-0_25.Podrobněji: https://is.muni.cz/publication/1669278/cs
-
Bringing kleptography to real-world TLS D - Stať ve sborníkuJANOVSKÝ, Adam; Jan KRHOVJÁK a Václav MATYÁŠ. Bringing kleptography to real-world TLS. Online. In Olivier Blazy, Chan Yeob Yeun. Information Security Theory and Practice. Cham, Switzerland: Springer, 2019, s. 15-27. ISBN 978-3-030-20073-2. Dostupné z: https://doi.org/10.1007/978-3-030-20074-9_3.Podrobněji: https://is.muni.cz/publication/1491907/cs