Jan Hajny

Orcid: 0000-0003-2831-1073

According to our database1, Jan Hajny authored at least 92 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography.
IEEE Access, 2024

Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
Maximizing privacy and security of collaborative indoor positioning using zero-knowledge proofs.
Internet Things, July, 2023

Secure Cloud Storage System for Digital Evidence.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

Deploying Quantum Key Distribution into the Existing University Data Infrastructure.
Proceedings of the IEEE AFRICON 2023, Nairobi, Kenya, September 20-22, 2023, 2023

On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Curricula Designer with Enhanced ECSF Analysis.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Long-term Parameters Monitoring of the IDQ Clavis 3 QKD System.
Proceedings of the 30th International Conference on Software, 2022

On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Integrating Smart Card Authentication to Web Applications.
Proceedings of the 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2022

Towards to Lightweight and Secure Access Control Systems for Car-Sharing Services.
Proceedings of the 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2022

Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Security of Smart Grid Networks in the Cyber Ranges.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Adding European Cybersecurity Skills Framework into Curricula Designer.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs.
IACR Cryptol. ePrint Arch., 2021

Privacy-Enhancing Group Signcryption Scheme.
IEEE Access, 2021

Post-Quantum Era Privacy Protection for Intelligent Infrastructures.
IEEE Access, 2021

Framework, Tools and Good Practices for Cybersecurity Curricula.
IEEE Access, 2021

Towards CRYSTALS-Kyber VHDL Implementation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Privacy ABCs: Now Ready for Your Wallets!
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Quantum Key Distribution Polygon.
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021

Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

PESTLE Analysis of Cybersecurity Education.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Building Open Source Cyber Range To Teach Cyber Security.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Cybersecurity Curricula Designer.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Secret Sharing-based Authenticated Key Agreement Protocol.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Hardware-Accelerated Cryptography for Software-Defined Networks with P4.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

2019
A Privacy-Enhancing Framework for Internet of Things Services.
IACR Cryptol. ePrint Arch., 2019

A Secure Publish/Subscribe Protocol for Internet of Things.
IACR Cryptol. ePrint Arch., 2019

Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards.
IACR Cryptol. ePrint Arch., 2019

Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Ensuring security of a telemedicine project in compliance with GDPR.
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019

Smart Grid Security: Survey and Challenges.
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019

Decentralized Privacy-preserving Access for Low Emission Zones.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Multidevice Authentication with Strong Privacy Protection.
Wirel. Commun. Mob. Comput., 2018

Evaluation of anonymous digital signatures for privacy-enhancing mobile applications.
Int. J. Secur. Networks, 2018

Secure and efficient two-factor zero-knowledge authentication solution for access control systems.
Comput. Secur., 2018

Hardware-Accelerated Twofish Core for FPGA.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Assessment of Cryptography Support and Security on Programmable Smart Cards.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Anonymous Data Collection Scheme from Short Group Signatures.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Packet generators on field programmable gate array platform.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Efficient and secure access control system based on programmable smart cards.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Anonymous Credentials with Practical Revocation using Elliptic Curves.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A non-invasive electricity measurement within the smart grid landscape: Arduino-based visualization platform for IoT.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

On practical deployment of smart card based authenticated key agreement schemes.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

2016
Light-weight group signatures with time-bound membership.
Secur. Commun. Networks, 2016

Towards Efficient Application of Cryptographic Schemes on Constrained Microcontrollers.
J. Circuits Syst. Comput., 2016

On perspective of security and privacy-preserving solutions in the internet of things.
Comput. Networks, 2016

Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Privacy-preserving authentication systems using smart devices.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Multi-Device Authentication using Wearables and IoT.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

2015
Efficient group signatures for privacy-preserving vehicular networks.
Telecommun. Syst., 2015

Attribute-based credentials with cryptographic collusion prevention.
Secur. Commun. Networks, 2015

Secure electronic voting based on group signatures.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Security and privacy in the smart grid services.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Usability of pairing-based cryptography on smartphones.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Practical privacy-enhancing technologies.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Cryptography for privacy-preserving electronic services.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Modern physical access control systems and privacy protection.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment.
Proceedings of the SECRYPT 2015, 2015

Secure Physical Access Control with Strong Cryptographic Protection.
Proceedings of the SECRYPT 2015, 2015

Privacy-Enhanced Data Collection Scheme for Smart-Metering.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Efficient modular multiplication for programmable smart-cards.
Telecommun. Syst., 2014

Privacy-preserving framework for geosocial applications.
Secur. Commun. Networks, 2014

Privacy-PAC: Privacy-Enhanced Physical Access Control.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Privacy-Friendly Access Control Based on Personal Attributes.
Proceedings of the Advances in Information and Computer Security, 2014

2013
Trade-off between signature aggregation and batch verification.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Efficient security solution for privacy-preserving cloud services.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration.
Proceedings of the SECRYPT 2013, 2013

Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks.
Proceedings of the SECRYPT 2013, 2013

Evaluation of Software-Oriented Block Ciphers on Smartphones.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Optimization of Power Analysis Using Neural Network.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Autentizační protokoly a ochrana soukromí ; Authentication Protocols and Privacy Protection.
PhD thesis, 2012

Group signatures for secure and privacy preserving vehicular ad hoc networks.
Proceedings of the Q2SWinet'12, 2012

Short-Term Linkable Group Signatures with Categorized Batch Verification.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Practical Revocable Anonymous Credentials.
Proceedings of the Communications and Multimedia Security, 2012

Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
Anonymous Authentication with Spread Revelation.
Cryptologia, 2011

Accelerated modular arithmetic for low-performance devices.
Proceedings of the 34th International Conference on Telecommunications and Signal Processing (TSP 2011), 2011

Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Privacy Protection for user Authentication.
Proceedings of the SECRYPT 2010, 2010

2009
Universal Authentication Framework - Requirements and Phase Design.
Proceedings of the SECRYPT 2009, 2009


  Loading...