Lukas Malina

Orcid: 0000-0002-7208-2514

According to our database1, Lukas Malina authored at least 95 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Information Security and Privacy Management in Intelligent Transportation Systems.
Complex Syst. Informatics Model. Q., 2024

Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography.
IEEE Access, 2024

Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

Lattice-based Multisignature Optimization for RAM Constrained Devices.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Secure and Privacy-Preserving Car-Sharing Systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Quantum-Resistant and Secure MQTT Communication.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
ADEROS: Artificial Intelligence-Based Detection System of Critical Events for Road Security.
IEEE Syst. J., December, 2023

Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

On Security and Privacy in Vehicle Speed-Limiting Services in the Internet of Vehicles.
IEEE Intell. Transp. Syst. Mag., 2023

Lattice-Based Threshold Signature Implementation for Constrained Devices.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Secure Cloud Storage System for Digital Evidence.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

Implementation and Field Testing of V2V Vehicle Stopping System.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022

HArMoNICS: High-Assurance Microgrid Network Infrastructure Case Study.
IEEE Access, 2022

Capturing the Vehicle to Everything Communication Using Software Defined Radio in ITS-G5.
Proceedings of the 45th International Conference on Telecommunications and Signal Processing, 2022

On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Towards to Lightweight and Secure Access Control Systems for Car-Sharing Services.
Proceedings of the 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2022

On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs.
IACR Cryptol. ePrint Arch., 2021

Privacy-Enhancing Group Signcryption Scheme.
IEEE Access, 2021

Post-Quantum Era Privacy Protection for Intelligent Infrastructures.
IEEE Access, 2021

Towards CRYSTALS-Kyber VHDL Implementation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Privacy ABCs: Now Ready for Your Wallets!
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

The Security Testbed for the Purposes of the ITS-G5 Communication Attacks Prevention.
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021

Hardware-based Cryptographic Accelerator for Post Quantum Era.
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021

Quantum Key Distribution Polygon.
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021

Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Privacy-Preserving Online Parking Based on Smart Contracts.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Manager Asks: Which Vulnerability Must be Eliminated First?
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Hardware-Accelerated Cryptography for Software-Defined Networks with P4.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Detection of wireless fake access points.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

2019
A Privacy-Enhancing Framework for Internet of Things Services.
IACR Cryptol. ePrint Arch., 2019

A Secure Publish/Subscribe Protocol for Internet of Things.
IACR Cryptol. ePrint Arch., 2019

Optimized Blockchain Model for Internet of Things based Healthcare Applications.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

On Detection and Mitigation of Slow Rate Denial of Service Attacks.
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019

Energy Attack in LoRaWAN: Experimental Validation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Multidevice Authentication with Strong Privacy Protection.
Wirel. Commun. Mob. Comput., 2018

Evaluation of anonymous digital signatures for privacy-enhancing mobile applications.
Int. J. Secur. Networks, 2018

Secure and efficient two-factor zero-knowledge authentication solution for access control systems.
Comput. Secur., 2018

Assessment of Cryptography Support and Security on Programmable Smart Cards.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Anonymous Data Collection Scheme from Short Group Signatures.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

On Track of Sigfox Confidentiality with End-to-End Encryption.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Efficient and secure access control system based on programmable smart cards.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Anonymous Credentials with Practical Revocation using Elliptic Curves.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

On practical deployment of smart card based authenticated key agreement schemes.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

2016
Crucial pitfall of DPA Contest V4.2 implementation.
Secur. Commun. Networks, 2016

Light-weight group signatures with time-bound membership.
Secur. Commun. Networks, 2016

Towards Efficient Application of Cryptographic Schemes on Constrained Microcontrollers.
J. Circuits Syst. Comput., 2016

On perspective of security and privacy-preserving solutions in the internet of things.
Comput. Networks, 2016

Profiling power analysis attack based on MLP in DPA contest V4.2.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Privacy-preserving authentication systems using smart devices.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Multi-Device Authentication using Wearables and IoT.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

2015
Efficient group signatures for privacy-preserving vehicular networks.
Telecommun. Syst., 2015

Attribute-based credentials with cryptographic collusion prevention.
Secur. Commun. Networks, 2015

Scalable authentication for integration server.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Secure electronic voting based on group signatures.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Security and privacy in the smart grid services.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Usability of pairing-based cryptography on smartphones.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Practical privacy-enhancing technologies.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Cryptography for privacy-preserving electronic services.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Secure digital archiving in post-quantum era.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment.
Proceedings of the SECRYPT 2015, 2015

Secure Physical Access Control with Strong Cryptographic Protection.
Proceedings of the SECRYPT 2015, 2015

Privacy-Enhanced Data Collection Scheme for Smart-Metering.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Kryptografické protokoly s ochranou soukromí pro zabezpečení heterogenních sítí ; Privacy Preserving Cryptographic Protocols for Secure Heterogeneous Networks.
PhD thesis, 2014

Efficient modular multiplication for programmable smart-cards.
Telecommun. Syst., 2014

Privacy-preserving framework for geosocial applications.
Secur. Commun. Networks, 2014

Privacy-PAC: Privacy-Enhanced Physical Access Control.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Privacy-Friendly Access Control Based on Personal Attributes.
Proceedings of the Advances in Information and Computer Security, 2014

2013
Trade-off between signature aggregation and batch verification.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Efficient security solution for privacy-preserving cloud services.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration.
Proceedings of the SECRYPT 2013, 2013

Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks.
Proceedings of the SECRYPT 2013, 2013

Evaluation of Software-Oriented Block Ciphers on Smartphones.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Optimization of Power Analysis Using Neural Network.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Group signatures for secure and privacy preserving vehicular ad hoc networks.
Proceedings of the Q2SWinet'12, 2012

Short-Term Linkable Group Signatures with Categorized Batch Verification.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Practical Revocable Anonymous Credentials.
Proceedings of the Communications and Multimedia Security, 2012

Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
Secure authentication and key establishment in the SIP architecture.
Proceedings of the 34th International Conference on Telecommunications and Signal Processing (TSP 2011), 2011

Accelerated modular arithmetic for low-performance devices.
Proceedings of the 34th International Conference on Telecommunications and Signal Processing (TSP 2011), 2011

Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011


  Loading...