~~NOTOC~~
====== Publications ======
If you have published anything not in the list, please add the bibliography entry to the list.
Instructions can be found in the [[https://gitlab.fi.muni.cz/labak/wiki-publications|GitLab repository]]Note down also the information on rejections and authorship percentages. We keep track of our lab efforts and author shares are useful for dissertation proposal/dissertation/habilitation/...
There is a [[:internal:crocs:submissions|dedicated page where to write them]].
==== 2024====
* **Breaking DPA-protected Kyber via the pair-pointwise multiplication**\\ [[:publications:authors:estuardo-alpirez-bock|Estuardo Alpirez Bock]], [[:publications:authors:gustavo-banegas|Gustavo Banegas]], [[:publications:authors:chris-brzuska|Chris Brzuska]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:kirthivaasan-puniamurthy|Kirthivaasan Puniamurthy]] and [[:publications:authors:milan-sorf|Milan Šorf]],\\ //Applied Cryptography and Network Security//, Springer Nature, 2024.\\ Keywords: [[:publications:keywords:pqc|pqc]], [[:publications:keywords:side-channel|side-channel]], ++ BibTeX |@Article{2024-acns-bock,
title = {Breaking DPA-protected Kyber via the pair-pointwise multiplication},
author = {Estuardo Alpirez Bock and Gustavo Banegas and Chris Brzuska and Lukasz Chmielewski and Kirthivaasan Puniamurthy and Milan Šorf},
booktitle = {Applied Cryptography and Network Security},
publisher = {Springer Nature},
year = {2024},
keywords = {PQC, side-channel},
}
++
* **CNN architecture extraction on edge GPU**\\ [[:publications:authors:peter-horvath|Péter Horváth]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:lejla-batina|Lejla Batina]], [[:publications:authors:leo-weissbart|Léo Weissbart]] and [[:publications:authors:yuval-yarom|Yuval Yarom]],\\ //Artificial Intelligence in Hardware Security (AIHWS) Workshop affiliated with ACNS//, Springer Nature, 2024.\\ Keywords: [[:publications:keywords:side-channel|side-channel]], ++ BibTeX |@InProceedings{2024-aihws-horvath,
title = {{CNN} architecture extraction on edge {GPU}},
author = {Péter Horváth and Lukasz Chmielewski and Lejla Batina and Léo Weissbart and Yuval Yarom},
booktitle = {Artificial Intelligence in Hardware Security (AIHWS) Workshop affiliated with ACNS},
publisher = {Springer Nature},
year = {2024},
keywords = {side-channel},
}
++
* **Chain of trust: Unraveling the references among Common Criteria certified products**\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //IFIP International Conference on ICT Systems Security and Privacy Protection//, Springer International Publishing, accepted for publication, 2024, .\\ Keywords: [[:publications:keywords:sec-certs|sec-certs]], [[https://arxiv.org/abs/2404.14246|paper website]], ++ BibTeX |@InProceedings{2024-ifipsec-janovsky,
title = {Chain of trust: Unraveling the references among Common Criteria certified products},
author = {Adam Janovsky and Lukasz Chmielewski and Petr Svenda and Jan Jancar and Vashek Matyas},
booktitle = {IFIP International Conference on ICT Systems Security and Privacy Protection},
pages = {},
publisher = {Springer International Publishing, accepted for publication},
year = {2024},
keywords = {sec-certs},
url = {https://arxiv.org/abs/2404.14246},
}
++
* **TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:milan-broz|Milan Broz]], [[:publications:authors:roman-lacko|Roman Lacko]], [[:publications:authors:tomas-jaros|Tomas Jaros]], [[:publications:authors:daniel-zatovic|Daniel Zatovic]] and [[:publications:authors:josef-pospisil|Josef Pospisil]],\\ //IACR Transactions on Cryptographic Hardware and Embedded Systems//, IACR, 2024, 714–734.\\ Keywords: [[:publications:keywords:tpm|tpm]], [[:publications:keywords:rsa|rsa]], [[:publications:keywords:ecc|ecc]], [[:publications:keywords:cc|cc]], [[:publications:keywords:fips140|fips140]], [[:publications:keywords:sidechannel|sidechannel]], {{:publications:pdf:2024-ches-tpmscan.pdf|pre-print PDF}}, [[http://dx.doi.org/10.46586/tches.v2024.i2.714-734|DOI website]], [[https://tches.iacr.org/index.php/TCHES/article/view/11444|paper website]], ++ BibTeX |@InProceedings{2024-ches-tpmscan,
title = {TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips},
author = {Petr Svenda and Antonin Dufka and Milan Broz and Roman Lacko and Tomas Jaros and Daniel Zatovic and Josef Pospisil},
booktitle = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
volume = {2024, No. 2},
pages = {714–734},
publisher = {IACR},
year = {2024},
issn = {ISSN 2569-2925},
doi = {10.46586/tches.v2024.i2.714-734},
url = {https://tches.iacr.org/index.php/TCHES/article/view/11444},
keywords = {tpm, rsa, ecc, CC, fips140, sidechannel},
}
++
* **Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction**\\ [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:michal-muzik|Michal Muzik]], [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:david-smahel|David Smahel]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Computers \& Security//, 2024, 103667.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:authentication|authentication]], [[http://dx.doi.org/https://doi.org/10.1016/j.cose.2023.103667|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404823005771|paper website]], ++ BibTeX |@Article{2024-compsec-kruzikova,
title = {Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction},
author = {Agata Kruzikova and Michal Muzik and Lenka Knapova and Lenka Dedkova and David Smahel and Vashek Matyas},
journal = {Computers \& Security},
volume = {138},
pages = {103667},
year = {2024},
issn = {0167-4048},
doi = {https://doi.org/10.1016/j.cose.2023.103667},
url = {https://www.sciencedirect.com/science/article/pii/S0167404823005771},
keywords = {usablesec, authentication},
}
++
* **“These results must be false”: A usability evaluation of constant-time analysis tools**\\ [[:publications:authors:marcel-fourne|Marcel Fourné]], [[:publications:authors:daniel-de-almeida-braga|Daniel De Almeida Braga]], [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:mohamed-sabt|Mohamed Sabt]], [[:publications:authors:peter-schwabe|Peter Schwabe]], [[:publications:authors:gilles-barthe|Gilles Barthe]], [[:publications:authors:pierre-alain-fouque|Pierre-Alain Fouque]] and [[:publications:authors:yasemin-acar|Yasemin Acar]],\\ //Proceedings of the 33rd USENIX Security Symposium//, USENIX Association, 2024, to appear.\\ Keywords: [[:publications:keywords:constant-time|constant-time]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2024-usenix-jancar.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2024-usenix-jancar,
title = {“These results must be false”: A usability evaluation of constant-time analysis tools},
author = {Marcel Fourné and Daniel De Almeida Braga and Jan Jancar and Mohamed Sabt and Peter Schwabe and Gilles Barthe and Pierre-Alain Fouque and Yasemin Acar},
booktitle = {Proceedings of the 33rd USENIX Security Symposium},
pages = {to appear},
publisher = {USENIX Association},
year = {2024},
keywords = {constant-time, cryptoimplementations, usablesec, libraries, side-channel},
}
++
==== 2023====
* **Enabling Efficient Threshold Signature Computation via Java Card API**\\ [[:publications:authors:antonin-dufka|Antonin Dufka]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings of the 18th International Conference on Availability, Reliability and Security//, Association for Computing Machinery, 2023, 11-20.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], [[:publications:keywords:cryptocurrencies|cryptocurrencies]], [[:publications:keywords:javacard|javacard]], {{:publications:pdf:2023-ares-dufka.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3600160.3600180|DOI website]], ++ BibTeX |@InProceedings{2023-ares-dufka,
title = {Enabling Efficient Threshold Signature Computation via Java Card API},
author = {Antonin Dufka and Petr Svenda},
booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security},
pages = {11-20},
publisher = {Association for Computing Machinery},
year = {2023},
isbn = {9798400707728},
doi = {10.1145/3600160.3600180},
keywords = {smartcards, SMPC, cryptocurrencies, javacard},
}
++
* **Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations**\\ [[:publications:authors:ben-nassi|Ben Nassi]], [[:publications:authors:ofek-vayner|Ofek Vayner]], [[:publications:authors:etay-iluz|Etay Iluz]], [[:publications:authors:dudi-nassi|Dudi Nassi]], [[:publications:authors:or-hai-cohen|Or Hai Cohen]], [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:daniel-genkin|Daniel Genkin]], [[:publications:authors:eran-tromer|Eran Tromer]], [[:publications:authors:boris-zadov|Boris Zadov]] and [[:publications:authors:yuval-elovici|Yuval Elovici]],\\ //30th ACM Conference on Computer and Communications Security (CCS'2023)//, ACM, 2023, 268–280.\\ Keywords: [[:publications:keywords:cryptolibs|cryptolibs]], [[:publications:keywords:leakage|leakage]], [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.1145/3576915.3616620|DOI website]], ++ BibTeX |@InProceedings{2023-ccs-jancar,
title = {Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations},
author = {Ben Nassi and Ofek Vayner and Etay Iluz and Dudi Nassi and Or Hai Cohen and Jan Jancar and Daniel Genkin and Eran Tromer and Boris Zadov and Yuval Elovici},
booktitle = {30th ACM Conference on Computer and Communications Security (CCS'2023)},
pages = {268–280},
publisher = {ACM},
address = {New York, NY, USA},
year = {2023},
isbn = {9798400700507},
doi = {10.1145/3576915.3616620},
keywords = {cryptolibs, leakage, side-channel, cryptoimplementations},
}
++
* **ProMETHEUS: A Secure Lightweight Spectrum Allocation Protocol against SSDF Attacks in Cognitive Radio IoT Networks**\\ [[:publications:authors:milan-patnaik|Milan Patnaik]], [[:publications:authors:k.-bharati|K. Bharati]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //IEEE Commun. Lett.//, 2023, 2919--2923.\\ Keywords: [[:publications:keywords:iot|iot]], [[http://dx.doi.org/10.1109/LCOMM.2023.3317335|DOI website]], [[https://doi.org/10.1109/LCOMM.2023.3317335|paper website]], ++ BibTeX |@Article{dblp:journals/icl/patnaikbm23,
title = {ProMETHEUS: {A} Secure Lightweight Spectrum Allocation Protocol against {SSDF} Attacks in Cognitive Radio IoT Networks},
author = {Milan Patnaik and K. Bharati and Vashek Matyas},
journal = {{IEEE} Commun. Lett.},
volume = {27},
number = {11},
pages = {2919--2923},
year = {2023},
doi = {10.1109/LCOMM.2023.3317335},
url = {https://doi.org/10.1109/LCOMM.2023.3317335},
keywords = {IoT},
}
++
* **SoK: SCA-secure ECC in software - mission impossible?**\\ [[:publications:authors:lejla-batina|Lejla Batina]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:björn-haase|Björn Haase]], [[:publications:authors:niels-samwel|Niels Samwel]] and [[:publications:authors:peter-schwabe|Peter Schwabe]],\\ //IACR Trans. Cryptogr. Hardw. Embed. Syst.//, 2023, 557--589.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:side-channel|side-channel]], [[http://dx.doi.org/10.46586/TCHES.V2023.I1.557-589|DOI website]], ++ BibTeX |@Article{2023-ches-sok,
title = {SoK: SCA-secure {ECC} in software - mission impossible?},
author = {Lejla Batina and Lukasz Chmielewski and Björn Haase and Niels Samwel and Peter Schwabe},
journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
volume = {2023},
number = {1},
pages = {557--589},
year = {2023},
doi = {10.46586/TCHES.V2023.I1.557-589},
keywords = {ECC, side-channel},
}
++
* **The adoption rate of JavaCard features by certified products and open-source projects **\\ [[:publications:authors:lukas-zaoral|Lukas Zaoral]], [[:publications:authors:antonin-dufka|Antonin Dufka]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings of the 22nd Smart Card Research and Advanced Application Conference, Lecture Notes in Computer Science, vol 14530//, Springer, 2023, 169--189.\\ Keywords: [[:publications:keywords:cryptographic-hardware|cryptographic hardware]], [[:publications:keywords:javacard|javacard]], [[:publications:keywords:common-criteria|common criteria]], [[:publications:keywords:fips140|fips140]], [[:publications:keywords:smartcards|smartcards]], [[http://dx.doi.org/10.1007/978-3-031-54409-5_9|DOI website]], ++ BibTeX |@InProceedings{2023-cardis-javacard,
title = {The adoption rate of JavaCard features by certified products and open-source projects },
author = {Lukas Zaoral and Antonin Dufka and Petr Svenda},
booktitle = {Proceedings of the 22nd Smart Card Research and Advanced Application Conference, Lecture Notes in Computer Science, vol 14530},
pages = {169--189},
publisher = {Springer},
year = {2023},
isbn = {978-3-031-54409-5},
doi = {10.1007/978-3-031-54409-5_9},
keywords = {Cryptographic Hardware, javacard, common criteria, fips140, smartcards},
language = {eng},
}
++
* **sec-certs: Examining the security certification practice for better vulnerability mitigation**\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:łukasz-chmielewski|Łukasz Chmielewski]], [[:publications:authors:jiri-michalik|Jiri Michalik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ arXiv, 2023.\\ Keywords: [[:publications:keywords:sec-certs|sec-certs]], [[http://dx.doi.org/10.48550/arXiv.2311.17603|DOI website]], ++ BibTeX |@TechReport{2023-seccerts-janovsky,
title = {sec-certs: Examining the security certification practice for better vulnerability mitigation},
author = {Adam Janovsky and Jan Jancar and Petr Svenda and Łukasz Chmielewski and Jiri Michalik and Vashek Matyas},
publisher = {arXiv},
year = {2023},
doi = {10.48550/arXiv.2311.17603},
keywords = {sec-certs},
}
++
==== 2022====
* **A Bad Day to Die Hard: Correcting the Dieharder Battery**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:lubomir-obratil|Lubomir Obratil]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:dusan-klinec|Dusan Klinec]],\\ //Journal of Cryptology//, Springer, 2022, 1--20.\\ Keywords: [[:publications:keywords:dieharder-battery|dieharder battery]], [[:publications:keywords:randomness|randomness]], [[:publications:keywords:p-value|p-value]], [[:publications:keywords:kolmogorov-smirnov-test|kolmogorov-smirnov test]], [[http://dx.doi.org/https://doi.org/10.1007/s00145-021-09414-y|DOI website]], ++ BibTeX |@Article{2022-journalofcryptology-sys,
title = {A Bad Day to Die Hard: Correcting the Dieharder Battery},
author = {Marek Sys and Lubomir Obratil and Vashek Matyas and Dusan Klinec},
journal = {Journal of Cryptology},
volume = {35},
number = {1},
pages = {1--20},
publisher = {Springer},
year = {2022},
doi = {https://doi.org/10.1007/s00145-021-09414-y},
keywords = {Dieharder battery, randomness, p-value, Kolmogorov-Smirnov test},
}
++
* **A Longitudinal Study of Cryptographic API: A Decade of Android Malware**\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:davide-maiorca|Davide Maiorca]], [[:publications:authors:dominik-macko|Dominik Macko]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:giorgio-giacinto|Giorgio Giacinto]],\\ //Proceedings of the 19th International Conference on Security and Cryptography//, 2022, 121--133.\\ Keywords: [[:publications:keywords:cryptolibs|cryptolibs]], [[:publications:keywords:malware|malware]], [[:publications:keywords:android|android]], [[https://github.com/adamjanovsky/AndroidMalwareCrypto|paper website]], ++ BibTeX |@InProceedings{2022-secrypt-janovsky,
title = {{A Longitudinal Study of Cryptographic API: A Decade of Android Malware}},
author = {Adam Janovsky and Davide Maiorca and Dominik Macko and Vashek Matyas and Giorgio Giacinto},
booktitle = {Proceedings of the 19th International Conference on Security and Cryptography},
pages = {121--133},
year = {2022},
isbn = {978-989-758-590-6},
issn = {2184-7711},
url = {https://github.com/adamjanovsky/AndroidMalwareCrypto},
keywords = {cryptolibs, malware, Android},
}
++
* **Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:michaela-balazova|Michaela Balážová]], [[:publications:authors:pavol-zacik|Pavol Žáčik]], [[:publications:authors:eric-vincent-valcik|Eric Vincent Valčík]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 2022 European Symposium on Usable Security//, ACM, 2022, 131-144.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2022-eurousec-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3549015.3554296|DOI website]], ++ BibTeX |@InProceedings{2022-eurousec-ukrop,
title = {Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors},
author = {Martin Ukrop and Michaela Balážová and Pavol Žáčik and Eric Vincent Valčík and Vashek Matyas},
booktitle = {Proceedings of the 2022 European Symposium on Usable Security},
series = {EuroUSEC '22},
pages = {131-144},
publisher = {ACM},
location = {Karlsruhe, Germany},
year = {2022},
doi = {10.1145/3549015.3554296},
keywords = {usablesec, Red-Hat},
}
++
* **Comparing Nonresponders and Responders of Online Intercept Surveys: A Large-Scale Experimental ICT Security-Related Study**\\ [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:david-smahel|David Smahel]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Human Behavior and Emerging Technologies//, Hindawi, 2022, 3107621.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[http://dx.doi.org/10.1155/2022/3107621|DOI website]], [[https://doi.org/10.1155/2022/3107621|paper website]], ++ BibTeX |@Article{2022-hbet-knapova,
title = {Comparing Nonresponders and Responders of Online Intercept Surveys: A Large-Scale Experimental ICT Security-Related Study},
author = {Lenka Knapova and David Smahel and Lenka Dedkova and Vashek Matyas},
journal = {Human Behavior and Emerging Technologies},
volume = {2022},
pages = {3107621},
publisher = {Hindawi},
year = {2022},
issn = {2578-1863},
doi = {10.1155/2022/3107621},
url = {https://doi.org/10.1155/2022/3107621},
keywords = {usablesec},
month = {July},
day = {28},
}
++
* **DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:vojtech-suchanek|Vojtech Suchanek]], [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Progress in Cryptology - AFRICACRYPT 2022//, Springer Nature Switzerland, 2022, 493-517.\\ {{:publications:pdf:2022-africacrypt-sedlacek.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-031-17433-9_21|DOI website]], ++ BibTeX |@InProceedings{2022-africacrypt-sedlacek,
title = {DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits},
author = {Vladimir Sedlacek and Vojtech Suchanek and Antonin Dufka and Marek Sys and Vashek Matyas},
booktitle = {Progress in Cryptology - AFRICACRYPT 2022},
pages = {493-517},
publisher = {Springer Nature Switzerland},
address = {Cham},
year = {2022},
isbn = {978-3-031-17433-9},
doi = {10.1007/978-3-031-17433-9_21},
}
++
* **Even if users do not read security directives, their behavior is not so catastrophic**\\ [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:kamil-malinka|Kamil Malinka]], [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:lenka-knapova|Lenka Knapova]] and [[:publications:authors:agata-kruzikova|Agata Kruzikova]],\\ //Communications of the ACM//, ACM, 2022, 37--40.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:directive|directive]], [[http://dx.doi.org/10.1145/3471928|DOI website]], ++ BibTeX |@Article{2022-cacm-matyas,
title = {Even if users do not read security directives, their behavior is not so catastrophic},
author = {Vashek Matyas and Kamil Malinka and Lydia Kraus and Lenka Knapova and Agata Kruzikova},
journal = {Communications of the ACM},
volume = {65},
number = {1},
pages = {37--40},
publisher = {ACM},
year = {2022},
doi = {10.1145/3471928},
keywords = {usablesec, directive},
}
++
* **Experience with Abrupt Transition to Remote Teaching of Embedded Systems**\\ [[:publications:authors:jan-koniarik|Jan Koniarik]], [[:publications:authors:daniel-dlhopolcek|Daniel Dlhopolcek]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Proceedings of the 2022 ACM Conference on Innovation and Technology in Computer Science Education//, ACM, 2022.\\ {{:publications:pdf:2022-iticse-koniarik.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3502718.3524821|DOI website]], [[https://github.com/koniarik/teaching-embedded-remotely|paper website]], ++ BibTeX |@InProceedings{2022-iticse-koniarik,
title = {Experience with Abrupt Transition to Remote Teaching of Embedded Systems},
author = {Jan Koniarik and Daniel Dlhopolcek and Martin Ukrop},
booktitle = {Proceedings of the 2022 ACM Conference on Innovation and Technology in Computer Science Education},
series = {ITiCSE ’22},
publisher = {ACM},
location = {Dublin, Ireland},
year = {2022},
doi = {10.1145/3502718.3524821},
url = {https://github.com/koniarik/teaching-embedded-remotely},
}
++
* **JCAlgTest: Robust identification metadata for certified smartcards**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:rudolf-kvasnovsky|Rudolf Kvasnovsky]], [[:publications:authors:imrich-nagy|Imrich Nagy]] and [[:publications:authors:antonin-dufka|Antonin Dufka]],\\ //19th International Conference on Security and Cryptography//, INSTICC, 2022, 597--604.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:javacard|javacard]], [[http://dx.doi.org/10.5220/0000163500003283|DOI website]], ++ BibTeX |@InProceedings{2022-jcalgtest-svenda,
title = {JCAlgTest: Robust identification metadata for certified smartcards},
author = {Petr Svenda and Rudolf Kvasnovsky and Imrich Nagy and Antonin Dufka},
booktitle = {19th International Conference on Security and Cryptography},
pages = {597--604},
publisher = {INSTICC},
address = {Lisabon},
location = {Lisabon},
year = {2022},
isbn = {978-989-758-590-6},
doi = {10.5220/0000163500003283},
keywords = {smartcards, javacard},
language = {eng},
}
++
* **Large-scale randomness study of security margins for 100+ cryptographic functions**\\ [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:karel-kubicek|Karel Kubicek]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ INSTICC, 2022, 134--146.\\ [[http://dx.doi.org/10.5220/0000163500003283|DOI website]], ++ BibTeX |@InProceedings{2022-securitymargins-secrypt,
title = {Large-scale randomness study of security margins for 100+ cryptographic functions},
author = {Dusan Klinec and Marek Sys and Karel Kubicek and Petr Svenda and Vashek Matyas},
pages = {134--146},
publisher = {INSTICC},
location = {Lisabon},
year = {2022},
isbn = {978-989-758-590-6},
doi = {10.5220/0000163500003283},
conference = {19th International Conference on Security and Cryptography (SECRYPT 2022)},
language = {eng},
}
++
* **Protecting the Most Significant Bits in Scalar Multiplication Algorithms**\\ [[:publications:authors:estuardo-alpirez-bock|Estuardo Alpirez Bock]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]] and [[:publications:authors:konstantina-miteloudi|Konstantina Miteloudi]],\\ //Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings//, Springer, 2022, volume 13783 of Lecture Notes in Computer Science, 118--137.\\ [[http://dx.doi.org/10.1007/978-3-031-22829-2\_7|DOI website]], ++ BibTeX |@InProceedings{2022-space-msb,
title = {Protecting the Most Significant Bits in Scalar Multiplication Algorithms},
author = {Estuardo Alpirez Bock and Lukasz Chmielewski and Konstantina Miteloudi},
booktitle = {Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, {SPACE} 2022, Jaipur, India, December 9-12, 2022, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {13783},
pages = {118--137},
publisher = {Springer},
year = {2022},
doi = {10.1007/978-3-031-22829-2\_7},
}
++
* **SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes**\\ [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings of the 19th International Conference on Security and Cryptography//, SCITEPRESS, 2022, 305-316.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], [[:publications:keywords:cryptocurrencies|cryptocurrencies]], {{:publications:pdf:2022-secrypt-shine.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0011145600003283|DOI website]], ++ BibTeX |@InProceedings{2022-secrypt-shine,
title = {SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes},
author = {Antonin Dufka and Vladimir Sedlacek and Petr Svenda},
booktitle = {Proceedings of the 19th International Conference on Security and Cryptography},
pages = {305-316},
publisher = {SCITEPRESS},
year = {2022},
isbn = {978-989-758-590-6},
issn = {2184-7711},
doi = {10.5220/0011145600003283},
keywords = {smartcards, SMPC, cryptocurrencies},
}
++
* **Usability Insights from Establishing TLS Connections**\\ [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:matej-grabovsky|Matej Grabovsky]], [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:katarina-galanska|Katarina Galanska]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ICT Systems Security and Privacy Protection//, Springer International Publishing, 2022.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2022-ifipsec-kraus.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-031-06975-8_17|DOI website]], ++ BibTeX |@InProceedings{2022-ifipsec-kraus,
title = {Usability Insights from Establishing TLS Connections},
author = {Lydia Kraus and Matej Grabovsky and Martin Ukrop and Katarina Galanska and Vashek Matyas},
booktitle = {ICT Systems Security and Privacy Protection},
series = {IFIP Advances in Information and Communication Technology},
publisher = {Springer International Publishing},
year = {2022},
doi = {10.1007/978-3-031-06975-8_17},
keywords = {usablesec},
}
++
* **Usable and secure? User perception of four authentication methods for mobile banking**\\ [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:david-smahel|David Smahel]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Computers \& Security//, 2022, 102603.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:tacr|tacr]], [[:publications:keywords:authentication|authentication]], [[http://dx.doi.org/10.1016/j.cose.2022.102603|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404822000025|paper website]], ++ BibTeX |@Article{2022-compsec-kruzikova,
title = {Usable and secure? User perception of four authentication methods for mobile banking},
author = {Agata Kruzikova and Lenka Knapova and David Smahel and Lenka Dedkova and Vashek Matyas},
journal = {Computers \& Security},
volume = {115},
pages = {102603},
year = {2022},
issn = {0167-4048},
doi = {10.1016/j.cose.2022.102603},
url = {https://www.sciencedirect.com/science/article/pii/S0167404822000025},
keywords = {usablesec, TACR, authentication},
}
++
* **“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks**\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:marcel-fourne|Marcel Fourné]], [[:publications:authors:daniel-de-almeida-braga|Daniel De Almeida Braga]], [[:publications:authors:mohamed-sabt|Mohamed Sabt]], [[:publications:authors:peter-schwabe|Peter Schwabe]], [[:publications:authors:gilles-barthe|Gilles Barthe]], [[:publications:authors:pierre-alain-fouque|Pierre-Alain Fouque]] and [[:publications:authors:yasemin-acar|Yasemin Acar]],\\ //43rd IEEE Symposium on Security and Privacy//, IEEE, 2022.\\ Keywords: [[:publications:keywords:constant-time|constant-time]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2022-sp-jancar.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2022-sp-jancar,
title = {“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks},
author = {Jan Jancar and Marcel Fourné and Daniel De Almeida Braga and Mohamed Sabt and Peter Schwabe and Gilles Barthe and Pierre-Alain Fouque and Yasemin Acar},
booktitle = {43rd IEEE Symposium on Security and Privacy},
publisher = {IEEE},
address = {San Francisco},
location = {San Francisco},
year = {2022},
keywords = {constant-time, cryptoimplementations, usablesec, libraries, side-channel},
language = {eng},
}
++
==== 2021====
* **A formula for disaster: a unified approach to elliptic curve special-point-based attacks**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jesus-javier-chi-dominguez|Jesús-Javier Chi-Domínguez]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:billy-bob-brumley|Billy Bob Brumley]],\\ //Advances in Cryptology – ASIACRYPT 2021//, Springer, 2021.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2021-asiacrypt-formulas.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2021-asiacrypt-formulas,
title = {A formula for disaster: a unified approach to elliptic curve special-point-based attacks},
author = {Vladimir Sedlacek and Jesús-Javier Chi-Domínguez and Jan Jancar and Billy Bob Brumley},
booktitle = {Advances in Cryptology – ASIACRYPT 2021},
publisher = {Springer},
year = {2021},
isbn = {978-3-030-64837-4},
keywords = {ECC, cryptoimplementations, libraries, side-channel},
}
++
* **Challenges Faced by Teaching Assistants in Computer Science Education Across Europe**\\ [[:publications:authors:emma-riese|Emma Riese]], [[:publications:authors:madeleine-loras|Madeleine Loras]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:tomas-effenberger|Tomas Effenberger]],\\ //Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education//, ACM, 2021.\\ {{:publications:pdf:2021-iticse-riese.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3430665.3456304|DOI website]], ++ BibTeX |@InProceedings{2021-iticse-riese,
title = {Challenges Faced by Teaching Assistants in Computer Science Education Across Europe},
author = {Emma Riese and Madeleine Loras and Martin Ukrop and Tomas Effenberger},
booktitle = {Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education},
series = {ITiCSE ’21},
publisher = {ACM},
location = {Padeborn, Germany},
year = {2021},
doi = {10.1145/3430665.3456304},
}
++
* **How Do Users Chain Email Accounts Together?**\\ [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:maria-svidronova|Maria Svidronova]] and [[:publications:authors:elizabeth-stobert|Elizabeth Stobert]],\\ //IFIP International Conference on ICT Systems Security and Privacy Protection//, Springer, Cham, 2021, .\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2021-ifipsec-kraus.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2021-ifipsec-kraus,
title = {How Do Users Chain Email Accounts Together?},
author = {Lydia Kraus and Maria Svidronova and Elizabeth Stobert},
booktitle = {IFIP International Conference on ICT Systems Security and Privacy Protection},
pages = {},
publisher = {Springer, Cham},
year = {2021},
keywords = {usablesec},
}
++
* **The Stack: Unplugged Activities for Teaching Computer Science (poster)**\\ [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Proceedings of the 52nd ACM Technical Symposium on Computer Science Education//, ACM, 2021.\\ {{:publications:pdf:2021-sigcse-svabensky.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3408877.3439569|DOI website]], ++ BibTeX |@InProceedings{2021-sigcse-svabensky,
title = {The Stack: Unplugged Activities for Teaching Computer Science (poster)},
author = {Valdemar Svabensky and Martin Ukrop},
booktitle = {Proceedings of the 52nd ACM Technical Symposium on Computer Science Education},
series = {SIGCSE ’21},
publisher = {ACM},
location = {Virtual},
year = {2021},
isbn = {978-1-4503-8062-1},
doi = {10.1145/3408877.3439569},
}
++
* **Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior**\\ [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]] and [[:publications:authors:david-smahel|David Smahel]],\\ //Cyberpsychology, Behavior, and Social Networking//, Mary Ann Liebert, Inc., 2021, 584-592.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[https://www.liebertpub.com/doi/full/10.1089/cyber.2020.0599|paper website]], ++ BibTeX |@Article{2021-cyberpsychology-knapova,
title = {Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior},
author = {Lenka Knapova and Agata Kruzikova and Lenka Dedkova and David Smahel},
journal = {Cyberpsychology, Behavior, and Social Networking},
pages = {584-592},
publisher = {Mary Ann Liebert, Inc.},
year = {2021},
url = {https://www.liebertpub.com/doi/full/10.1089/cyber.2020.0599},
keywords = {usablesec},
}
++
==== 2020====
* **Biased RSA private keys: Origin attribution of GCD-factorable keys**\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:peter-sekan|Peter Sekan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //25th European Symposium on Research in Computer Security (ESORICS) 2020//, Springer, 2020.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:bias|bias]], [[:publications:keywords:classification|classification]], [[:publications:keywords:smartcard|smartcard]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], ++ BibTeX |@InProceedings{2020-esorics-privrsabias,
title = {Biased RSA private keys: Origin attribution of GCD-factorable keys},
author = {Adam Janovsky and Matus Nemec and Petr Svenda and Peter Sekan and Vashek Matyas},
booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020},
publisher = {Springer},
year = {2020},
keywords = {RSA, bias, classification, smartcard, cryptoimplementations},
}
++
* **Evolution of SSL/TLS Indicators and Warnings in Web Browsers**\\ [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:tobias-fiebig|Tobias Fiebig]],\\ //27th International Workshop on Security Protocols (SPW 2019)//, Springer International Publishing, 2020, 267--280.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2019-spw-kraus.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-57043-9_25|DOI website]], ++ BibTeX |@InProceedings{2019-spw-kraus,
title = {Evolution of SSL/TLS Indicators and Warnings in Web Browsers},
author = {Lydia Kraus and Martin Ukrop and Vashek Matyas and Tobias Fiebig},
booktitle = {27th International Workshop on Security Protocols (SPW 2019)},
pages = {267--280},
publisher = {Springer International Publishing},
year = {2020},
doi = {10.1007/978-3-030-57043-9_25},
keywords = {usablesec},
}
++
* **Fooling primality tests on smartcards**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //25th European Symposium on Research in Computer Security (ESORICS) 2020//, Springer, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:primality|primality]], [[:publications:keywords:pseudoprimes|pseudoprimes]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2020-esorics-foolingprimes.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-59013-0\_11|DOI website]], ++ BibTeX |@InProceedings{2020-esorics-foolingprimes,
title = {Fooling primality tests on smartcards},
author = {Vladimir Sedlacek and Jan Jancar and Petr Svenda},
booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020},
publisher = {Springer},
year = {2020},
doi = {10.1007/978-3-030-59013-0\_11},
keywords = {ECC, primality, pseudoprimes, smartcards, cryptoimplementations},
}
++
* **JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets**\\ [[:publications:authors:vasilios-mavroudis|Vasilios Mavroudis]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ IEEE, 2020, 64--71.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:opentools|opentools]], [[:publications:keywords:smpc|smpc]], [[http://dx.doi.org/10.1109/EuroSPW51379.2020.00022|DOI website]], ++ BibTeX |@Article{2020-jcmathlib-cybercert,
title = {JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets},
author = {Vasilios Mavroudis and Petr Svenda},
volume = {61},
number = {2},
pages = {64--71},
publisher = {IEEE},
year = {2020},
doi = {10.1109/EuroSPW51379.2020.00022},
keywords = {ECC, smartcards, opentools, smpc},
conference = {First International Workshop on Lightweight and Incremental Cybersecurity Certification},
}
++
* **Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces**\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:marek-sys|Marek Sys]],\\ //Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020//, Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:leakage|leakage]], [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.13154/tches.v2020.i4.281-308|DOI website]], ++ BibTeX |@InProceedings{2020-tches-minerva,
title = {Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces},
author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys},
booktitle = {Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020},
publisher = {Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems},
year = {2020},
issn = {2569-2925},
doi = {10.13154/tches.v2020.i4.281-308},
keywords = {ECC, smartcards, libraries, leakage, side-channel, cryptoimplementations},
}
++
* **Privacy-Friendly Monero Transaction Signing on a Hardware Wallet**\\ [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings//, Springer, 2020, volume 580 of {IFIP} Advances in Information and Communication Technology, 338--351.\\ Keywords: [[:publications:keywords:monero|monero]], [[:publications:keywords:bulletproofs|bulletproofs]], [[:publications:keywords:hardware-wallets|hardware wallets]], [[:publications:keywords:cryptocurrencies|cryptocurrencies]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2020-ifipsec-klinec.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-58201-2\_23|DOI website]], ++ BibTeX |@InProceedings{2020-ifipsec-klinec,
title = {Privacy-Friendly Monero Transaction Signing on a Hardware Wallet},
author = {Dusan Klinec and Vashek Matyas},
booktitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {580},
pages = {338--351},
publisher = {Springer},
year = {2020},
doi = {10.1007/978-3-030-58201-2\_23},
keywords = {Monero, Bulletproofs, hardware wallets, cryptocurrencies, cryptoimplementations},
}
++
* **Privacy-Friendly Monero Transaction Signing on a Hardware Wallet**\\ [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings//, Springer, 2020, volume 580 of {IFIP} Advances in Information and Communication Technology, 338--351.\\ Keywords: [[:publications:keywords:monero|monero]], [[:publications:keywords:bulletproofs|bulletproofs]], [[:publications:keywords:hardware-wallets|hardware wallets]], [[:publications:keywords:cryptocurrency|cryptocurrency]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:smpc|smpc]], {{:publications:pdf:2020-ifipsec-klinec.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-58201-2\_23|DOI website]], ++ BibTeX |@InProceedings{2020-ifipsec-klinec,
title = {Privacy-Friendly Monero Transaction Signing on a Hardware Wallet},
author = {Dusan Klinec and Vashek Matyas},
booktitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {580},
pages = {338--351},
publisher = {Springer},
year = {2020},
doi = {10.1007/978-3-030-58201-2\_23},
keywords = {Monero, Bulletproofs, hardware wallets, cryptocurrency, cryptoimplementations, SMPC},
}
++
* **Teaching Lab: Training Novice Computer Science Teachers (poster)**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:imrich-nagy|Imrich Nagy]],\\ //Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education//, ACM, 2020.\\ {{:publications:pdf:2020-iticse-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3341525.3393967|DOI website]], ++ BibTeX |@InProceedings{2020-iticse-ukrop,
title = {Teaching Lab: Training Novice Computer Science Teachers (poster)},
author = {Martin Ukrop and Valdemar Svabensky and Imrich Nagy},
booktitle = {Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education},
series = {ITiCSE ’20},
publisher = {ACM},
location = {Trondheim, Norway},
year = {2020},
isbn = {978-1-4503-6874-2},
doi = {10.1145/3341525.3393967},
}
++
* **User Testing of Mobile Banking Authentication Methods: UX Testing, User Interviews and Quantitative Survey**\\ [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:ondrej-gabrhelik|Ondrej Gabrhelik]], [[:publications:authors:david-smahel|David Smahel]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:petr-dolezal|Petr Dolezal]] and [[:publications:authors:martina-smahelova|Martina Smahelova]],\\ Technical report, Masaryk University, 2020.\\ {{:publications:pdf:2020-tacr-report.pdf|pre-print PDF}}, ++ BibTeX |@TechReport{2020-tacr-report,
title = {User Testing of Mobile Banking Authentication Methods: UX Testing, User Interviews and Quantitative Survey},
author = {Agata Kruzikova and Lenka Knapova and Ondrej Gabrhelik and David Smahel and Lenka Dedkova and Vashek Matyas and Petr Dolezal and Martina Smahelova},
publisher = {Technical report, Masaryk University},
year = {2020},
}
++
* **Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:lydia-kraus|Lydia Kraus]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Digital Threats: Research and Practice//, Association for Computing Machinery, 2020.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2020-dtrap-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3419472|DOI website]], ++ BibTeX |@Article{2020-dtrap-ukrop,
title = {Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)},
author = {Martin Ukrop and Lydia Kraus and Vashek Matyas},
journal = {Digital Threats: Research and Practice},
volume = {1},
number = {4},
numpages = {30},
publisher = {Association for Computing Machinery},
year = {2020},
issn = {2692-1626},
doi = {10.1145/3419472},
keywords = {usablesec, Red-Hat},
}
++
==== 2019====
* **BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:karel-kubicek|Karel Kubicek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //E-Business and Telecommunications//, Springer International Publishing, 2019, 123--149.\\ Keywords: [[:publications:keywords:randomness|randomness]], [[:publications:keywords:hypothesis|hypothesis]], [[:publications:keywords:boolean|boolean]], ++ BibTeX |@InProceedings{2019-secrypt2017selected-sys,
title = {BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256},
author = {Marek Sys and Dusan Klinec and Karel Kubicek and Petr Svenda},
booktitle = {E-Business and Telecommunications},
pages = {123--149},
publisher = {Springer International Publishing},
address = {Cham},
year = {2019},
isbn = {978-3-030-11039-0},
keywords = {randomness, hypothesis, boolean},
editor = {Obaidat, Mohammad S. and Cabello, Enrique},
}
++
* **BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:karel-kubicek|Karel Kubicek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //E-Business and Telecommunications//, Springer International Publishing, 2019, 123--149.\\ Keywords: [[:publications:keywords:randomness|randomness]], [[:publications:keywords:hypothesis|hypothesis]], [[:publications:keywords:boolean|boolean]], ++ BibTeX |@InProceedings{2019-secrypt2017selected-sys,
title = {BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256},
author = {Marek Sys and Dusan Klinec and Karel Kubicek and Petr Svenda},
booktitle = {E-Business and Telecommunications},
pages = {123--149},
publisher = {Springer International Publishing},
address = {Cham},
year = {2019},
isbn = {978-3-030-11039-0},
keywords = {randomness, hypothesis, boolean},
editor = {Obaidat, Mohammad S. and Cabello, Enrique},
}
++
* **Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques**\\ [[:publications:authors:vojtech-mrazek|Vojtech Mrazek]], [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //IEEE Transactions on Very Large Scale Integration (VLSI) Systems//, IEEE, 2019.\\ Keywords: [[:publications:keywords:fpga|fpga]], [[:publications:keywords:genetic-algorithms|genetic-algorithms]], [[:publications:keywords:randomness|randomness]], [[:publications:keywords:distinguishers|distinguishers]], [[http://dx.doi.org/10.1109/TVLSI.2019.2923848|DOI website]], ++ BibTeX |@InProceedings{2019-ieeevsli-mrazek,
title = {Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques},
author = {Vojtech Mrazek and Marek Sys and Petr Svenda},
booktitle = {IEEE Transactions on Very Large Scale Integration (VLSI) Systems},
publisher = {IEEE},
year = {2019},
issn = {1557-9999},
doi = {10.1109/TVLSI.2019.2923848},
keywords = {FPGA, genetic-algorithms, randomness, distinguishers},
}
++
* **Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks**\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:pierre-louis-palant|Pierre-Louis Palant]],\\ //Sensors//, Multidisciplinary Digital Publishing Institute, 2019.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.3390/s19040914|DOI website]], [[http://www.mdpi.com/1424-8220/19/4/914|paper website]], ++ BibTeX |@Article{2019-sensors-nemec,
title = {Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks},
author = {Lukas Nemec and Vashek Matyas and Radim Ostadal and Petr Svenda and Pierre-Louis Palant},
journal = {Sensors},
volume = {19},
number = {4},
publisher = {Multidisciplinary Digital Publishing Institute},
year = {2019},
issn = {1424-8220},
doi = {10.3390/s19040914},
url = {http://www.mdpi.com/1424-8220/19/4/914},
keywords = {WSN},
}
++
* **I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT//, SciTePress, 2019, 25-36.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:factorization|factorization]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2019-secrypt-sedlacek.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0007786600250036|DOI website]], ++ BibTeX |@Conference{2019-secrypt-sedlacek,
title = {I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability},
author = {Vladimir Sedlacek and Dusan Klinec and Marek Sys and Petr Svenda and Vashek Matyas},
booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT},
pages = {25-36},
organization = {INSTICC},
publisher = {SciTePress},
year = {2019},
isbn = {978-989-758-378-0},
doi = {10.5220/0007786600250036},
keywords = {ECC, factorization, smartcards, cryptoimplementations},
}
++
* **Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem**\\ [[:publications:authors:stefano-calzavara|Stefano Calzavara]], [[:publications:authors:riccardo-focardi|Riccardo Focardi]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:alvise-rabitti|Alvise Rabitti]] and [[:publications:authors:marco-squarcina|Marco Squarcina]],\\ //2019 IEEE Symposium on Security and Privacy (SP)//, IEEE, 2019.\\ [[http://dx.doi.org/10.1109/sp.2019.00053|DOI website]], ++ BibTeX |@InProceedings{2019-sp-calzavara,
title = {Postcards from the Post-{HTTP} World: Amplification of {HTTPS} Vulnerabilities in the Web Ecosystem},
author = {Stefano Calzavara and Riccardo Focardi and Matus Nemec and Alvise Rabitti and Marco Squarcina},
booktitle = {2019 {IEEE} Symposium on Security and Privacy ({SP})},
publisher = {IEEE},
year = {2019},
doi = {10.1109/sp.2019.00053},
}
++
* **Reflective Diary for Professional Development of Novice Teachers**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:jan-nehyba|Jan Nehyba]],\\ //Proceedings of the 50th ACM Technical Symposium on Computer Science Education//, ACM, 2019, 1088--1094.\\ {{:publications:pdf:2019-sigcse-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3287324.3287448|DOI website]], ++ BibTeX |@InProceedings{2019-sigcse-ukrop,
title = {Reflective Diary for Professional Development of Novice Teachers},
author = {Martin Ukrop and Valdemar Svabensky and Jan Nehyba},
booktitle = {Proceedings of the 50th ACM Technical Symposium on Computer Science Education},
series = {SIGCSE '19},
pages = {1088--1094},
publisher = {ACM},
address = {New York, NY, USA},
year = {2019},
isbn = {978-1-4503-5890-3},
doi = {10.1145/3287324.3287448},
}
++
* **Will You Trust This TLS Certificate? Perceptions of People Working in IT**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:heider-ahmad-mutleq-wahsheh|Heider Ahmad Mutleq Wahsheh]],\\ //Proceedings of the 35rd Annual Computer Security Applications Conference (ACSAC'2019)//, ACM, 2019.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2019-acsac-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3359789.3359800|DOI website]], ++ BibTeX |@InProceedings{2019-acsac-ukrop,
title = {Will You Trust This TLS Certificate? Perceptions of People Working in IT},
author = {Martin Ukrop and Lydia Kraus and Vashek Matyas and Heider Ahmad Mutleq Wahsheh},
booktitle = {Proceedings of the 35rd Annual Computer Security Applications Conference (ACSAC'2019)},
publisher = {ACM},
year = {2019},
doi = {10.1145/3359789.3359800},
keywords = {usablesec, Red-Hat},
}
++
==== 2018====
* **A Large-scale Comparative Study of Beta Testers and Regular Users**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Communications of the ACM//, ACM, 2018, 64--71.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], {{:publications:pdf:2018-cacm-stavova.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3173570|DOI website]], ++ BibTeX |@Article{2018-cacm-stavova,
title = {A Large-scale Comparative Study of Beta Testers and Regular Users},
author = {Vlasta Stavova and Lenka Dedkova and Martin Ukrop and Vashek Matyas},
journal = {Communications of the ACM},
volume = {61},
number = {2},
pages = {64--71},
publisher = {ACM},
year = {2018},
doi = {10.1145/3173570},
keywords = {usablesec, ESET},
}
++
* **Adaptive Secrecy Amplification with Radio Channel Key Extraction**\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS)//, 2018, 123-130.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1109/DCOSS.2018.00028|DOI website]], ++ BibTeX |@InProceedings{2018-dcoss-nemec,
title = {Adaptive Secrecy Amplification with Radio Channel Key Extraction},
author = {Lukas Nemec and Radim Ostadal and Vashek Matyas and Petr Svenda},
booktitle = {2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS)},
pages = {123-130},
year = {2018},
issn = {2325-2944},
doi = {10.1109/DCOSS.2018.00028},
keywords = {WSN},
}
++
* **Entropy Crowdsourcing -- Protocols for Link Key Updates in Wireless Sensor Networks**\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Security Protocols Workshop XXVI//, Springer International Publishing, 2018, 84-92.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2018-spw-nemec,
title = {Entropy Crowdsourcing -- Protocols for Link Key Updates in Wireless Sensor Networks},
author = {Lukas Nemec and Radim Ostadal and Vashek Matyas and Petr Svenda},
booktitle = {Security Protocols Workshop XXVI},
pages = {84-92},
publisher = {Springer International Publishing},
year = {2018},
isbn = {978-3-030-03251-7},
keywords = {WSN},
}
++
* **Evolving Boolean Functions for Fast and Efficient Randomness Testing**\\ [[:publications:authors:vojtech-mrazek|Vojtech Mrazek]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:zdenek-vasicek|Zdenek Vasicek]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '18)//, Association for Computing Machinery, 2018, 1302--1309.\\ [[http://dx.doi.org/10.1145/3205455.3205518|DOI website]], ++ BibTeX |@InProceedings{2018-gecco-mrazek,
title = {Evolving Boolean Functions for Fast and Efficient Randomness Testing},
author = {Vojtech Mrazek and Marek Sys and Zdenek Vasicek and Lukas Sekanina and Vashek Matyas},
booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '18)},
pages = {1302--1309},
publisher = {Association for Computing Machinery},
location = {Kyoto, JP},
year = {2018},
isbn = {978-1-4503-5618-3},
doi = {10.1145/3205455.3205518},
}
++
* **Experimental large-scale review of attractors for detection of potentially unwanted applications**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:mike-just|Mike Just]], [[:publications:authors:david-smahel|David Smahel]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Computers \& Security//, 2018, 92--100.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1016/j.cose.2018.02.017|DOI website]], [[http://www.sciencedirect.com/science/article/pii/S0167404818301640|paper website]], ++ BibTeX |@Article{2018-compsec-statova,
title = {Experimental large-scale review of attractors for detection of potentially unwanted applications},
author = {Vlasta Stavova and Lenka Dedkova and Vashek Matyas and Mike Just and David Smahel and Martin Ukrop},
journal = {Computers \& Security},
volume = {76},
pages = {92--100},
year = {2018},
issn = {0167-4048},
doi = {10.1016/j.cose.2018.02.017},
url = {http://www.sciencedirect.com/science/article/pii/S0167404818301640},
keywords = {usablesec, ESET, GAMU},
}
++
* **Why Johnny the Developer Can't Work with Public Key Certificates: An Experimental Study of OpenSSL Usability**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Topics in Cryptology -- CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018//, Springer International Publishing, 2018, 45--64.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2018-rsa-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-319-76953-0_3|DOI website]], ++ BibTeX |@InBook{2018-rsa-ukrop,
title = {Why Johnny the Developer Can't Work with Public Key Certificates: An Experimental Study of OpenSSL Usability},
author = {Martin Ukrop and Vashek Matyas},
booktitle = {Topics in Cryptology -- CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018},
pages = {45--64},
publisher = {Springer International Publishing},
year = {2018},
doi = {10.1007/978-3-319-76953-0_3},
keywords = {usablesec, Red-Hat},
}
++
==== 2017====
* **A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components**\\ [[:publications:authors:vasilios-mavroudis|Vasilios Mavroudis]], [[:publications:authors:andrea-cerulli|Andrea Cerulli]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:dan-cvrcek|Dan Cvrcek]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:george-danezis|George Danezis]],\\ //24th ACM Conference on Computer and Communications Security (CCS'2017)//, ACM, 2017, 1583--1600.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], ++ BibTeX |@InProceedings{2017-ccs-mavroudis,
title = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components},
author = {Vasilios Mavroudis and Andrea Cerulli and Petr Svenda and Dan Cvrcek and Dusan Klinec and George Danezis},
booktitle = {24th ACM Conference on Computer and Communications Security (CCS'2017)},
pages = {1583--1600},
publisher = {ACM},
year = {2017},
isbn = {978-1-4503-4946-8/17/10},
keywords = {smartcards, SMPC},
}
++
* **Factors Influencing the Purchase of Security Software for Mobile Devices -- Case Study**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:mike-just|Mike Just]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Infocommunications Journal//, 2017, 18--23.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], {{:publications:pdf:2017-infocomm-stavova.pdf|pre-print PDF}}, [[http://www.infocommunications.hu/2017_1|paper website]], ++ BibTeX |@Article{2017-infocomm-stavova,
title = {Factors Influencing the Purchase of Security Software for Mobile Devices -- Case Study},
author = {Vlasta Stavova and Vashek Matyas and Mike Just and Martin Ukrop},
journal = {Infocommunications Journal},
volume = {9},
issue = {1},
pages = {18--23},
year = {2017},
url = {http://www.infocommunications.hu/2017_1},
keywords = {usablesec, ESET, GAMU},
}
++
* **Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans**\\ [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:peter-sekan|Peter Sekan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)//, ACM, 2017.\\ Keywords: [[:publications:keywords:cryptolibs|cryptolibs]], [[:publications:keywords:rsa|rsa]], [[:publications:keywords:fingerprinting|fingerprinting]], [[:publications:keywords:smartcard|smartcard]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.1145/3134600.3134612|DOI website]], ++ BibTeX |@InProceedings{2017-acsac-nemec,
title = {Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans},
author = {Matus Nemec and Dusan Klinec and Petr Svenda and Peter Sekan and Vashek Matyas},
booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)},
publisher = {ACM},
year = {2017},
doi = {10.1145/3134600.3134612},
keywords = {cryptolibs, RSA, fingerprinting, smartcard, cryptoimplementations},
}
++
* **The Efficient Randomness Testing using Boolean Functions**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //The 14th International Conference on Security and Cryptography (Secrypt'2017)//, SCITEPRESS, 2017, 92--103.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], ++ BibTeX |@InProceedings{2017-secrypt-sys,
title = {The Efficient Randomness Testing using Boolean Functions},
author = {Marek Sys and Dusan Klinec and Petr Svenda},
booktitle = {The 14th International Conference on Security and Cryptography (Secrypt'2017)},
pages = {92--103},
publisher = {SCITEPRESS},
year = {2017},
isbn = {978-989-758-259-2},
keywords = {eacirc, randomness},
}
++
* **The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli**\\ [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //24th ACM Conference on Computer and Communications Security (CCS'2017)//, ACM, 2017, 1631--1648.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], ++ BibTeX |@InProceedings{2017-ccs-nemec,
title = {The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli},
author = {Matus Nemec and Marek Sys and Petr Svenda and Dusan Klinec and Vashek Matyas},
booktitle = {24th ACM Conference on Computer and Communications Security (CCS'2017)},
pages = {1631--1648},
publisher = {ACM},
year = {2017},
isbn = {978-1-4503-4946-8/17/10},
keywords = {RSA, cryptoimplementations},
}
++
==== 2016====
* **Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ACM Transactions on Mathematicsl Software//, ACM, 2016, 27:1--27:11.\\ Keywords: [[:publications:keywords:randomness|randomness]], [[http://dx.doi.org/10.1145/2988228|DOI website]], ++ BibTeX |@Article{2016-toms-sys,
title = {{Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm}},
author = {Marek Sys and Zdenek Riha and Vashek Matyas},
journal = {ACM Transactions on Mathematicsl Software},
volume = {43},
number = {3},
pages = {27:1--27:11},
publisher = {ACM},
year = {2016},
issn = {0098-3500},
doi = {10.1145/2988228},
keywords = {randomness},
}
++
* **Attack Detection Using Evolutionary Computation**\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:andriy-stetsko|Andriy Stetsko]],\\ //Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges//, Springer series on Studies in Computational Intelligence, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InCollection{2016-ciwsn-stehlik,
title = {Attack Detection Using Evolutionary Computation},
author = {Martin Stehlik and Vashek Matyas and Andriy Stetsko},
booktitle = {Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges},
publisher = {Springer series on Studies in Computational Intelligence},
year = {2016},
keywords = {WSN},
}
++
* **Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping -- Secrecy Amplification Case**\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //International Conference on Cryptology and Network Security (CANS 2016)//, Springer, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2016-cans-ostadal,
title = {Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping -- Secrecy Amplification Case},
author = {Radim Ostadal and Petr Svenda and Vashek Matyas},
booktitle = {International Conference on Cryptology and Network Security (CANS 2016)},
publisher = {Springer},
year = {2016},
keywords = {WSN},
}
++
* **Avalanche Effect in Improperly Initialized CAESAR Candidates**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016//, Open Publishing Association, 2016, volume 233 of Electronic Proceedings in Theoretical Computer Science, 72-81.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2016-memics-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.4204/EPTCS.233.7|DOI website]], ++ BibTeX |@InProceedings{2016-memics-ukrop,
title = {Avalanche Effect in Improperly Initialized CAESAR Candidates},
author = {Martin Ukrop and Petr Svenda},
booktitle = {Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016},
series = {Electronic Proceedings in Theoretical Computer Science},
volume = {233},
pages = {72-81},
publisher = {Open Publishing Association},
year = {2016},
doi = {10.4204/EPTCS.233.7},
keywords = {eacirc, randomness},
editor = {Bouda, Jan and Holík, Lukáš and Kofroň, Jan and Strejček, Jan and Rambousek, Adam},
eventtitle = {MEMICS},
eventdate = {October 23--25, 2016},
}
++
* **Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:mike-just|Mike Just]],\\ //IFIP International Conference on Information Security Theory and Practice//, 2016, 35--50.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:sodatsw|sodatsw]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1007/978-3-319-45931-8_3|DOI website]], ++ BibTeX |@InProceedings{2016-wistp-stavova,
title = {Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms},
author = {Vlasta Stavova and Vashek Matyas and Mike Just},
booktitle = {IFIP International Conference on Information Security Theory and Practice},
pages = {35--50},
organization = {Springer},
year = {2016},
doi = {10.1007/978-3-319-45931-8_3},
keywords = {usablesec, SODATSW, GAMU},
}
++
* **New results on reduced-round Tiny Encryption Algorithm using genetic programming**\\ [[:publications:authors:karel-kubicek|Karel Kubicek]], [[:publications:authors:jiri-novotny|Jiri Novotny]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //IEEE Infocommunications//, 2016.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2016-infocommunications-kubicek.pdf|pre-print PDF}}, [[http://www.infocommunications.hu/2016_1|paper website]], ++ BibTeX |@Article{2016-infocommunications-kubicek,
title = {New results on reduced-round Tiny Encryption Algorithm using genetic programming},
author = {Karel Kubicek and Jiri Novotny and Petr Svenda and Martin Ukrop},
journal = {IEEE Infocommunications},
volume = {8},
issue = {1},
year = {2016},
url = {http://www.infocommunications.hu/2016_1},
keywords = {eacirc, randomness},
}
++
* **On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:mike-just|Mike Just]],\\ //Euro Usable Security (EuroUSEC) Workshop Programme//, 2016.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:pua|pua]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.14722/eurousec.2016.23003|DOI website]], ++ BibTeX |@InProceedings{2016-eurousec-stavova,
title = {On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications},
author = {Vlasta Stavova and Vashek Matyas and Mike Just},
booktitle = {Euro Usable Security (EuroUSEC) Workshop Programme},
organization = {Internet Society},
year = {2016},
doi = {10.14722/eurousec.2016.23003},
keywords = {usablesec, ESET, PUA, GAMU},
}
++
* **Randomness Testing: Result Interpretation and Speed**\\ [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday//, Springer Berlin Heidelberg, 2016, 389--395.\\ [[http://dx.doi.org/10.1007/978-3-662-49301-4_24|DOI website]], [[https://doi.org/10.1007/978-3-662-49301-4_24|paper website]], ++ BibTeX |@InBook{2016-newcode-sys,
title = {Randomness Testing: Result Interpretation and Speed},
author = {Marek Sys and Vashek Matyas},
booktitle = {The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday},
pages = {389--395},
publisher = {Springer Berlin Heidelberg},
address = {Berlin, Heidelberg},
year = {2016},
isbn = {978-3-662-49301-4},
doi = {10.1007/978-3-662-49301-4_24},
url = {https://doi.org/10.1007/978-3-662-49301-4_24},
editor = {Ryan, Peter Y. A. and Naccache, David and Quisquater, Jean-Jacques},
}
++
* **Reconsidering Attacker Models in Ad-hoc Networks**\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //24th International Workshop on Security Protocols (SPW 2016)//, Springer, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2016-spw-ostadal,
title = {Reconsidering Attacker Models in Ad-hoc Networks},
author = {Radim Ostadal and Petr Svenda and Vashek Matyas},
booktitle = {24th International Workshop on Security Protocols (SPW 2016)},
publisher = {Springer},
year = {2016},
keywords = {WSN},
}
++
* **The Million-Key Question -- Investigating the Origins of RSA Public Keys**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:peter-sekan|Peter Sekan]], [[:publications:authors:rudolf-kvasnovsky|Rudolf Kvasnovsky]], [[:publications:authors:david-formanek|David Formanek]], [[:publications:authors:david-komarek|David Komarek]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //FI MU Report Series, FIMU-RS-2016-03//, Masaryk University, 2016, 1--83.\\ Keywords: [[:publications:keywords:rsa|rsa]], ++ BibTeX |@InProceedings{2016-fimunitr201603-svenda,
title = {The Million-Key Question -- Investigating the Origins of RSA Public Keys},
author = {Petr Svenda and Matus Nemec and Peter Sekan and Rudolf Kvasnovsky and David Formanek and David Komarek and Vashek Matyas},
booktitle = {FI MU Report Series, FIMU-RS-2016-03},
pages = {1--83},
publisher = {Masaryk University},
year = {2016},
keywords = {RSA},
}
++
* **The Million-Key Question -- Investigating the Origins of RSA Public Keys**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:peter-sekan|Peter Sekan]], [[:publications:authors:rudolf-kvasnovsky|Rudolf Kvasnovsky]], [[:publications:authors:david-formanek|David Formanek]], [[:publications:authors:david-komarek|David Komarek]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //The 25th USENIX Security Symposium (UsenixSec'2016)//, USENIX, 2016, 893--910.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2016-usenixsec-svenda.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2016-usenixsec-svenda,
title = {The Million-Key Question -- Investigating the Origins of RSA Public Keys},
author = {Petr Svenda and Matus Nemec and Peter Sekan and Rudolf Kvasnovsky and David Formanek and David Komarek and Vashek Matyas},
booktitle = {The 25th USENIX Security Symposium (UsenixSec'2016)},
pages = {893--910},
publisher = {USENIX},
year = {2016},
isbn = {978-1-931971-32-4},
keywords = {RSA, cryptoimplementations},
}
++
* **Towards better selective forwarding and delay attacks detection in wireless sensor networks**\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:andriy-stetsko|Andriy Stetsko]],\\ //2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)//, 2016, 1-6.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1109/ICNSC.2016.7478978|DOI website]], ++ BibTeX |@InProceedings{2016-icnsc-stehlik,
title = {Towards better selective forwarding and delay attacks detection in wireless sensor networks},
author = {Martin Stehlik and Vashek Matyas and Andriy Stetsko},
booktitle = {2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)},
pages = {1-6},
year = {2016},
doi = {10.1109/ICNSC.2016.7478978},
keywords = {WSN},
}
++
==== 2015====
* **Architecture Considerations for Massively Parallel Hardware Security Platform**\\ [[:publications:authors:dan-cvrcek|Dan Cvrcek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //The 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE--2015), LNCS 9354//, Springer, 2015, 269--288.\\ [[http://dx.doi.org/10.1007/978-3-319-24126-5_16|DOI website]], ++ BibTeX |@InProceedings{2015-space-cvrcek,
title = {Architecture Considerations for Massively Parallel Hardware Security Platform},
author = {Dan Cvrcek and Petr Svenda},
booktitle = {The 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE--2015), LNCS 9354},
pages = {269--288},
publisher = {Springer},
year = {2015},
doi = {10.1007/978-3-319-24126-5_16},
}
++
* **Challenges of fiction in network security -- perspective of virtualized environments**\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:tatevik-baghdasaryan|Tatevik Baghdasaryan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Cambridge International Workshop on Security Protocols//, Springer, 2015.\\ ++ BibTeX |@InProceedings{2015-spw-bukac,
title = {Challenges of fiction in network security -- perspective of virtualized environments},
author = {Vit Bukac and Radim Ostadal and Petr Svenda and Tatevik Baghdasaryan and Vashek Matyas},
booktitle = {Cambridge International Workshop on Security Protocols},
publisher = {Springer},
year = {2015},
}
++
* **DDoSaaS: DDoS jako služba**\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //IS2: From trends to solutions//, Tate International, 2015, 35-39.\\ Keywords: [[:publications:keywords:ddosaas|ddosaas]], ++ BibTeX |@InProceedings{2015-is2-bukac,
title = {DDoSaaS: DDoS jako služba},
author = {Vit Bukac and Vlasta Stavova and Lukas Nemec and Zdenek Riha and Vashek Matyas},
booktitle = {IS2: From trends to solutions},
pages = {35-39},
publisher = {Tate International},
address = {Praha},
location = {Praha},
year = {2015},
isbn = {978-80-86813-28-8},
keywords = {ddosaas},
}
++
* **On Secrecy Amplification Protocols**\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //The 9th WISTP International Conference on Information Security Theory and Practice (WISTP--2015), LNCS 9311//, Springer, 2015, 3--19.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-24018-3 1|DOI website]], ++ BibTeX |@InProceedings{2015-wistp-ostadal,
title = {On Secrecy Amplification Protocols},
author = {Radim Ostadal and Petr Svenda and Vashek Matyas},
booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP--2015), LNCS 9311},
pages = {3--19},
publisher = {Springer},
year = {2015},
doi = {10.1007/978-3-319-24018-3 1},
keywords = {WSN},
}
++
* **Service in Denial – Clouds Going with the Winds**\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 9th International Conference on Network and System Security//, Springer International Publishing, 2015, 130-143.\\ Keywords: [[:publications:keywords:ddosaas|ddosaas]], [[http://dx.doi.org/10.1007/978-3-319-25645-0_9|DOI website]], [[http://dx.doi.org/10.1007/978-3-319-25645-0_9|paper website]], ++ BibTeX |@InBook{2015-nss-bukac,
title = {Service in Denial – Clouds Going with the Winds},
author = {Vit Bukac and Vlasta Stavova and Lukas Nemec and Zdenek Riha and Vashek Matyas},
booktitle = {Proceedings of the 9th International Conference on Network and System Security},
pages = {130-143},
publisher = {Springer International Publishing},
year = {2015},
isbn = {978-3-319-25645-0},
doi = {10.1007/978-3-319-25645-0_9},
url = {http://dx.doi.org/10.1007/978-3-319-25645-0_9},
keywords = {ddosaas},
}
++
* **The challenge of increasing safe response of antivirus software users**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:kamil-malinka|Kamil Malinka]],\\ //International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science//, 2015, 133--143.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1007/978-3-319-29817-7_12|DOI website]], ++ BibTeX |@InProceedings{2015-memics-stavova,
title = {The challenge of increasing safe response of antivirus software users},
author = {Vlasta Stavova and Vashek Matyas and Kamil Malinka},
booktitle = {International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science},
pages = {133--143},
organization = {Springer},
year = {2015},
doi = {10.1007/978-3-319-29817-7_12},
keywords = {usablesec, ESET, GAMU},
}
++
* **WSNProtectLayer: Security Middleware for Wireless Sensor Networks**\\ [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:filip-jurnecka|Filip Jurnecka]] and [[:publications:authors:martin-stehlik|Martin Stehlik]],\\ //Securing Cyber-Physical Systems//, CRC Press, 2015, 119-162.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1201/b19311-6|DOI website]], ++ BibTeX |@InCollection{2015-scps-matyas,
title = {{WSNProtectLayer: Security Middleware for Wireless Sensor Networks}},
author = {Vashek Matyas and Petr Svenda and Andriy Stetsko and Dusan Klinec and Filip Jurnecka and Martin Stehlik},
booktitle = {Securing Cyber-Physical Systems},
pages = {119-162},
publisher = {CRC Press},
year = {2015},
isbn = {978-1-4987-0098-6},
doi = {10.1201/b19311-6},
keywords = {WSN},
}
++
==== 2014====
* **A New Approach to SA in Partially Compromised Networks**\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security, Privacy, and Applied Cryptography Engineering -- 4th Int. Conf., SPACE 2014, LNCS 8804//, Springer, 2014.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2014-space-ostadal,
title = {A New Approach to SA in Partially Compromised Networks},
author = {Radim Ostadal and Petr Svenda and Vashek Matyas},
booktitle = {Security, Privacy, and Applied Cryptography Engineering -- 4th Int. Conf., SPACE 2014, LNCS 8804},
publisher = {Springer},
year = {2014},
keywords = {WSN},
}
++
* **Constructing empirical tests of randomness**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //2014 11th International Conference on Security and Cryptography (SECRYPT)//, 2014, 1--9.\\ {{:publications:pdf:2014-secrypt-sys.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2014-secrypt-sys,
title = {Constructing empirical tests of randomness},
author = {Marek Sys and Petr Svenda and Martin Ukrop and Vashek Matyas},
booktitle = {2014 11th International Conference on Security and Cryptography (SECRYPT)},
pages = {1--9},
organization = {IEEE},
year = {2014},
}
++
* **Constructing empirical tests of randomness**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 11th International Conference on Security and Cryptography//, 2014.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2014-secrypt-sys.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0005023902290237|DOI website]], ++ BibTeX |@InProceedings{2014-secrypt-sys,
title = {Constructing empirical tests of randomness},
author = {Marek Sys and Petr Svenda and Martin Ukrop and Vashek Matyas},
booktitle = {Proceedings of the 11th International Conference on Security and Cryptography},
year = {2014},
doi = {10.5220/0005023902290237},
keywords = {eacirc, randomness},
eventtitle = {ICETE},
}
++
* **Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //E-Business and Telecommunications//, Springer Berlin Heidelberg, 2014, 290--305.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2014-ccis-svenda.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-662-44788-8_17|DOI website]], ++ BibTeX |@InCollection{2014-ccis-svenda,
title = {Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits},
author = {Petr Svenda and Martin Ukrop and Vashek Matyas},
booktitle = {E-Business and Telecommunications},
volume = {456},
pages = {290--305},
publisher = {Springer Berlin Heidelberg},
year = {2014},
doi = {10.1007/978-3-662-44788-8_17},
keywords = {eacirc, randomness},
}
++
* **Evaluation of key management schemes in wireless sensor networks**\\ [[:publications:authors:filip-jurnecka|Filip Jurnecka]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security and Trust Management//, Springer International Publishing, 2014, 198-203.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-11851-2_16|DOI website]], [[http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16|paper website]], ++ BibTeX |@InProceedings{2014-stm-jurnecka,
title = {Evaluation of key management schemes in wireless sensor networks},
author = {Filip Jurnecka and Martin Stehlik and Vashek Matyas},
booktitle = {Security and Trust Management},
pages = {198-203},
publisher = {Springer International Publishing},
address = {Switzerland},
year = {2014},
isbn = {978-3-319-11850-5},
doi = {10.1007/978-3-319-11851-2_16},
url = {http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16},
keywords = {WSN},
}
++
* **Faster Randomness Testing with the NIST Statistical Test Suite**\\ [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:zdenek-riha|Zdenek Riha]],\\ //International Conference on Security, Privacy, and Applied Cryptography Engineering//, 2014, 272--284.\\ ++ BibTeX |@InProceedings{2014-space-sys,
title = {Faster Randomness Testing with the NIST Statistical Test Suite},
author = {Marek Sys and Zdenek Riha},
booktitle = {International Conference on Security, Privacy, and Applied Cryptography Engineering},
pages = {272--284},
organization = {Springer},
year = {2014},
}
++
* **Improving Intrusion Detection Systems for Wireless Sensor Networks**\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:tobias-smolka|Tobias Smolka]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:martin-stehlik|Martin Stehlik]],\\ //Applied Cryptography and Network Security//, Springer International Publishing, 2014, volume 8479 of Lecture Notes in Computer Science, 343-360.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-07536-5_21|DOI website]], ++ BibTeX |@InCollection{2014-ssms-stetsko,
title = {Improving Intrusion Detection Systems for Wireless Sensor Networks},
author = {Andriy Stetsko and Tobias Smolka and Vashek Matyas and Martin Stehlik},
booktitle = {Applied Cryptography and Network Security},
series = {Lecture Notes in Computer Science},
volume = {8479},
pages = {343-360},
publisher = {Springer International Publishing},
year = {2014},
isbn = {978-3-319-07535-8},
doi = {10.1007/978-3-319-07536-5_21},
keywords = {WSN},
}
++
* **On Node Capturing Attacker Strategies**\\ [[:publications:authors:filip-jurnecka|Filip Jurnecka]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers//, Springer LNCS, 2014, 300-315.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-12400-1_29|DOI website]], ++ BibTeX |@InProceedings{2014-spw-jurnecka,
title = {On Node Capturing Attacker Strategies},
author = {Filip Jurnecka and Martin Stehlik and Vashek Matyas},
booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers},
pages = {300-315},
publisher = {Springer LNCS},
year = {2014},
doi = {10.1007/978-3-319-12400-1_29},
keywords = {WSN},
}
++
==== 2013====
* **Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks**\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:adam-saleh|Adam Saleh]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems//, MIT Press, 2013, 569-576.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://mitpress.mit.edu/sites/default/files/titles/content/ecal13/ch082.html|paper website]], ++ BibTeX |@InProceedings{2013-sssm-stehlik,
title = {Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks},
author = {Martin Stehlik and Adam Saleh and Andriy Stetsko and Vashek Matyas},
booktitle = {Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems},
pages = {569-576},
publisher = {MIT Press},
address = {Cambridge, MA 02142-1493 USA},
year = {2013},
isbn = {978-0-262-31709-2},
url = {http://mitpress.mit.edu/sites/default/files/titles/content/ecal13/ch082.html},
keywords = {WSN},
}
++
* **On the origin of yet another channel**\\ [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ Springer, 2013.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], {{:publications:pdf:2013-spw-svenda.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2013-spw-svenda,
title = {On the origin of yet another channel},
author = {Petr Svenda and Vashek Matyas},
organization = {Faculty of Informatics Masaryk University},
publisher = {Springer},
year = {2013},
keywords = {eacirc},
eventtitle = {Twenty-first International Workshop on Security Protocols},
eventdate = {2013-03-19},
}
++
* **Towards cryptographic function distinguishers with evolutionary circuits**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 10th International Conference on Security and Cryptography//, 2013, 135--146.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2013-secrypt-svenda.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0004524001350146|DOI website]], ++ BibTeX |@InProceedings{2013-secrypt-svenda,
title = {Towards cryptographic function distinguishers with evolutionary circuits},
author = {Petr Svenda and Martin Ukrop and Vashek Matyas},
booktitle = {Proceedings of the 10th International Conference on Security and Cryptography},
pages = {135--146},
year = {2013},
doi = {10.5220/0004524001350146},
keywords = {eacirc, randomness},
eventtitle = {ICETE},
}
++
==== 2012====
* **Evolutionary Design of Message Efficient Secrecy Amplification Protocols**\\ [[:publications:authors:tobias-smolka|Tobias Smolka]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Genetic Programming//, Berlin: Springer Verlag, 2012, 194--205.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2012-gp-smolka,
title = {Evolutionary Design of Message Efficient Secrecy Amplification Protocols},
author = {Tobias Smolka and Petr Svenda and Lukas Sekanina and Vashek Matyas},
booktitle = {Genetic Programming},
pages = {194--205},
publisher = {Berlin: Springer Verlag},
year = {2012},
keywords = {WSN},
}
++
* **Two improvements of random key predistribution for wireless sensor networks**\\ [[:publications:authors:jiri-kur|Jiri Kur]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //International Conference on Security and Privacy in Communication Systems//, 2012, 61--75.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2014-securecomm-kur,
title = {Two improvements of random key predistribution for wireless sensor networks},
author = {Jiri Kur and Vashek Matyas and Petr Svenda},
booktitle = {International Conference on Security and Privacy in Communication Systems},
pages = {61--75},
organization = {Springer},
year = {2012},
keywords = {WSN},
}
++
==== 2011====
* **Attack detection vs. privacy--How to find the link or how to hide it?**\\ [[:publications:authors:jiri-kur|Jiri Kur]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //International Workshop on Security Protocols//, 2011, 189--199.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2011-spw-kur,
title = {Attack detection vs. privacy--How to find the link or how to hide it?},
author = {Jiri Kur and Vashek Matyas and Andriy Stetsko and Petr Svenda},
booktitle = {International Workshop on Security Protocols},
pages = {189--199},
organization = {Springer},
year = {2011},
keywords = {WSN},
}
++
* **Calibrating and Comparing Simulators for Wireless Sensor Networks**\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 8\superscriptth IEEE International Conference on Mobile Adhoc and Sensor Systems//, IEEE Computer Society, 2011, 733-738.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2011-ssm-stetsko,
title = {Calibrating and Comparing Simulators for Wireless Sensor Networks},
author = {Andriy Stetsko and Martin Stehlik and Vashek Matyas},
booktitle = {Proceedings of the 8\superscript{th} IEEE International Conference on Mobile Adhoc and Sensor Systems},
series = {MASS '11},
pages = {733-738},
publisher = {{IEEE} Computer Society},
address = {Los Alamitos, CA, USA},
year = {2011},
isbn = {978-0-7695-4469-4},
keywords = {WSN},
}
++
==== 2009====
* **Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks**\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //EC2ND 2009 -- European Conference on Computer Network Defense//, IEEE Computer Society, 2009, 21-28.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2009-ec2nd-stetsko,
title = {Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks},
author = {Andriy Stetsko and Vashek Matyas},
booktitle = {EC2ND 2009 -- European Conference on Computer Network Defense},
pages = {21-28},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
year = {2009},
isbn = {978-0-7695-3983-6},
keywords = {WSN},
}
++
* **Evolutionary design of secrecy amplification protocols for wireless sensor networks**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the second ACM Conference on Wireless Network Security//, 2009, 225--236.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2009-cwsn-svenda,
title = {Evolutionary design of secrecy amplification protocols for wireless sensor networks},
author = {Petr Svenda and Lukas Sekanina and Vashek Matyas},
booktitle = {Proceedings of the second {ACM} Conference on Wireless Network Security},
pages = {225--236},
year = {2009},
keywords = {WSN},
}
++