Masarykova univerzita

Výpis publikací

česky | in English

Filtrování publikací

    2024

    1. JANOVSKÝ, Adam, Lukasz Michal CHMIELEWSKI, Petr ŠVENDA, Ján JANČÁR a Václav MATYÁŠ. Chain of Trust: Unraveling References Among Common Criteria Certified Products. Online. In Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis. ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology. volume 710. Cham: Springer Nature Switzerland, 2024, s. 191-205. ISBN 978-3-031-65175-5. Dostupné z: https://dx.doi.org/10.1007/978-3-031-65175-5_14.
    2. JANČÁR, Ján, Vojtěch SUCHÁNEK, Petr ŠVENDA, Vladimír SEDLÁČEK a Lukasz Michal CHMIELEWSKI. pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis. Online. In IACR Transactions on Cryptographic Hardware and Embedded Systems. Německo: Ruhr-University of Bochum, 2024, s. 355-381. ISSN 2569-2925. Dostupné z: https://dx.doi.org/10.46586/tches.v2024.i4.355-381.
    3. JANOVSKÝ, Adam, Ján JANČÁR, Petr ŠVENDA, Lukasz Michal CHMIELEWSKI, Jiří MICHALÍK a Václav MATYÁŠ. sec-certs: Examining the security certification practice for better vulnerability mitigation. Computers & Security. 2024, roč. 2024, č. 143, s. 1-13. ISSN 0167-4048. Dostupné z: https://dx.doi.org/10.1016/j.cose.2024.103895.
    4. FOURNÉ, Marcel, Daniel DE ALMEIDA BRAGA, Ján JANČÁR, Mohamed SABT, Peter SCHWABE, Gilles BARTHE, Pierre-Alain FOUQUE a Yasemin ACAR. “These results must be false”: A usability evaluation of constant-time analysis tools. Online. In Davide Balzarotti, Wenyuan Xu. 33rd USENIX Security Symposium. Philadelphia, PA, US. Philadelphia, US: USENIX Association, 2024, s. 6705-6722. ISBN 978-1-939133-44-1.

    2023

    1. NASSI, Ben, Ofek VAYNER, Etay ILUZ, Dudi NASSI, Ján JANČÁR, Daniel GENKIN, Eran TROMER, Boris ZADOV a Yuval ELOVICI. Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. Online. In 30th ACM Conference on Computer and Communications Security (CCS'2023). New York, NY, USA: Association for Computing Machinery, 2023, s. 268-280. ISBN 979-8-4007-0050-7. Dostupné z: https://dx.doi.org/10.1145/3576915.3616620.

    2022

    1. JANČÁR, Ján, Marcel FOURNÉ, Daniel DE ALMEIDA BRAGA, Mohamed SABT, Peter SCHWABE, Gilles BARTHE, Pierre-Alain FOUQUE a Yasemin ACAR. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. Online. In 43rd IEEE Symposium on Security and Privacy. San Francisco: IEEE, 2022, s. 632-649. ISBN 978-1-6654-1316-9. Dostupné z: https://dx.doi.org/10.1109/SP46214.2022.9833713.

    2021

    1. SEDLÁČEK, Vladimír, Jesús-Javier CHI-DOMINGUEZ, Ján JANČÁR a Billy Bob BRUMLEY. A formula for disaster: a unified approach to elliptic curve special-point-based attacks. Online. In Tibouchi M., Wang H. Advances in Cryptology – ASIACRYPT 2021. Cham: Springer, 2021, s. 130-159. ISBN 978-3-030-92061-6. Dostupné z: https://dx.doi.org/10.1007/978-3-030-92062-3_5.

    2020

    1. SEDLÁČEK, Vladimír, Ján JANČÁR a Petr ŠVENDA. Fooling primality tests on smartcards. In Liqun Chen, Ninghui Li, Kaitai Liang and Steve Schneider. 25th European Symposium on Research in Computer Security (ESORICS) 2020. Švýcarsko: Springer, 2020, s. 209-229. ISBN 978-3-030-59012-3. Dostupné z: https://dx.doi.org/10.1007/978-3-030-59013-0_11.
    2. JANČÁR, Ján, Vladimír SEDLÁČEK, Petr ŠVENDA a Marek SÝS. Minerva: The curse of ECDSA nonces. Online. In Amir Moradi, Mehdi Tibouchi. IACR Transactions on Cryptographic Hardware and Embedded Systems. Německo: Ruhr-University of Bochum, 2020, s. 281-308. ISSN 2569-2925. Dostupné z: https://dx.doi.org/10.13154/tches.v2020.i4.281-308.
Zobrazit podrobně
Zobrazeno: 19. 9. 2024 12:57