Petr Svenda
Orcid: 0000-0002-9784-7624
According to our database1,
Petr Svenda
authored at least 56 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
sec-certs: Examining the security certification practice for better vulnerability mitigation.
Comput. Secur., 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
The Power of Many: Securing Organisational Identity Through Distributed Key Management.
Proceedings of the Advanced Information Systems Engineering, 2024
Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023
The Adoption Rate of JavaCard Features by Certified Products and Open-Source Projects.
Proceedings of the Smart Card Research and Advanced Applications, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
2021
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021
2020
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
IEEE Trans. Very Large Scale Integr. Syst., 2019
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification.
Sensors, 2019
Sensors, 2019
I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor Viability.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the 14th International Conference on Distributed Computing in Sensor Systems, 2018
2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a Service.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
2014
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper).
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the SECRYPT 2013, 2013
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the Genetic Programming - 15th European Conference, 2012
2011
Proceedings of the Security Protocols XIX, 2011
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
2005
Proceedings of the First International Workshop on Security and Trust Management, 2005