~~NOTOC~~
====== Publications ======
If you have published anything not in the list, please add the bibliography entry to the list.
Instructions can be found in the [[https://gitlab.fi.muni.cz/labak/wiki-publications|GitLab repository]]Note down also the information on rejections and authorship percentages. We keep track of our lab efforts and author shares are useful for dissertation proposal/dissertation/habilitation/...
There is a [[:internal:crocs:submissions|dedicated page where to write them]].
==== 2024====
* **Breaking DPA-protected Kyber via the pair-pointwise multiplication**\\ [[:publications:authors:estuardo-alpirez-bock|Estuardo Alpirez Bock]], [[:publications:authors:gustavo-banegas|Gustavo Banegas]], [[:publications:authors:chris-brzuska|Chris Brzuska]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:kirthivaasan-puniamurthy|Kirthivaasan Puniamurthy]] and [[:publications:authors:milan-sorf|Milan Šorf]],\\ //Applied Cryptography and Network Security//, Springer Nature, 2024.\\ Keywords: [[:publications:keywords:pqc|pqc]], [[:publications:keywords:side-channel|side-channel]], ++ BibTeX |@Article{2024-acns-bock,
title = {Breaking DPA-protected Kyber via the pair-pointwise multiplication},
author = {Estuardo Alpirez Bock and Gustavo Banegas and Chris Brzuska and Lukasz Chmielewski and Kirthivaasan Puniamurthy and Milan Šorf},
booktitle = {Applied Cryptography and Network Security},
publisher = {Springer Nature},
year = {2024},
keywords = {PQC, side-channel},
}
++
* **CNN architecture extraction on edge GPU**\\ [[:publications:authors:peter-horvath|Péter Horváth]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:lejla-batina|Lejla Batina]], [[:publications:authors:leo-weissbart|Léo Weissbart]] and [[:publications:authors:yuval-yarom|Yuval Yarom]],\\ //Artificial Intelligence in Hardware Security (AIHWS) Workshop affiliated with ACNS//, Springer Nature, 2024.\\ Keywords: [[:publications:keywords:side-channel|side-channel]], ++ BibTeX |@InProceedings{2024-aihws-horvath,
title = {{CNN} architecture extraction on edge {GPU}},
author = {Péter Horváth and Lukasz Chmielewski and Lejla Batina and Léo Weissbart and Yuval Yarom},
booktitle = {Artificial Intelligence in Hardware Security (AIHWS) Workshop affiliated with ACNS},
publisher = {Springer Nature},
year = {2024},
keywords = {side-channel},
}
++
* **Chain of Trust: Unraveling References Among Common Criteria Certified Products**\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //IFIP International Conference on ICT Systems Security and Privacy Protection//, Springer Nature Switzerland, 2024, .\\ Keywords: [[:publications:keywords:sec-certs|sec-certs]], [[http://dx.doi.org/10.1007/978-3-031-65175-5_14|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404824001974|paper website]], ++ BibTeX |@InProceedings{2024-ifipsec-janovsky,
title = {Chain of Trust: Unraveling References Among Common Criteria Certified Products},
author = {Adam Janovsky and Lukasz Chmielewski and Petr Svenda and Jan Jancar and Vashek Matyas},
booktitle = {IFIP International Conference on ICT Systems Security and Privacy Protection},
pages = {},
publisher = {Springer Nature Switzerland},
address = {Cham},
year = {2024},
isbn = {978-3-031-65175-5},
doi = {10.1007/978-3-031-65175-5_14},
url = {https://www.sciencedirect.com/science/article/pii/S0167404824001974},
keywords = {sec-certs},
edition = {volume 710},
editor = {Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis},
}
++
* **TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:milan-broz|Milan Broz]], [[:publications:authors:roman-lacko|Roman Lacko]], [[:publications:authors:tomas-jaros|Tomas Jaros]], [[:publications:authors:daniel-zatovic|Daniel Zatovic]] and [[:publications:authors:josef-pospisil|Josef Pospisil]],\\ //IACR Transactions on Cryptographic Hardware and Embedded Systems//, IACR, 2024, 714–734.\\ Keywords: [[:publications:keywords:tpm|tpm]], [[:publications:keywords:rsa|rsa]], [[:publications:keywords:ecc|ecc]], [[:publications:keywords:cc|cc]], [[:publications:keywords:fips140|fips140]], [[:publications:keywords:sidechannel|sidechannel]], {{:publications:pdf:2024-ches-tpmscan.pdf|pre-print PDF}}, [[http://dx.doi.org/10.46586/tches.v2024.i2.714-734|DOI website]], [[https://tches.iacr.org/index.php/TCHES/article/view/11444|paper website]], ++ BibTeX |@InProceedings{2024-ches-tpmscan,
title = {TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips},
author = {Petr Svenda and Antonin Dufka and Milan Broz and Roman Lacko and Tomas Jaros and Daniel Zatovic and Josef Pospisil},
booktitle = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
volume = {2024, No. 2},
pages = {714–734},
publisher = {IACR},
year = {2024},
issn = {ISSN 2569-2925},
doi = {10.46586/tches.v2024.i2.714-734},
url = {https://tches.iacr.org/index.php/TCHES/article/view/11444},
keywords = {tpm, rsa, ecc, CC, fips140, sidechannel},
}
++
* **The Power of Many: Securing Organisational Identity Through Distributed Key Management**\\ [[:publications:authors:mariia-bakhtina|Mariia Bakhtina]], [[:publications:authors:jan-kvapil|Jan Kvapil]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:matulevicius-raimundas|Matulevicius Raimundas]],\\ //Advanced Information Systems Engineering//, Springer Nature Switzerland, 2024, 475--491.\\ Keywords: [[:publications:keywords:distributed-control|distributed control]], [[:publications:keywords:key-management|key management]], [[:publications:keywords:organisational-digital-identity|organisational digital identity]], [[:publications:keywords:security|security]], [[:publications:keywords:threshold-signatures|threshold signatures]], [[:publications:keywords:zero-trust|zero trust]], {{:publications:pdf:2024-caise-bakhtina.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-031-61057-8_28|DOI website]], ++ BibTeX |@InProceedings{2024-caise-bakhtina,
title = {The Power of Many: Securing Organisational Identity Through Distributed Key Management},
author = {Mariia Bakhtina and Jan Kvapil and Petr Svenda and Matulevicius Raimundas},
booktitle = {Advanced Information Systems Engineering},
pages = {475--491},
publisher = {Springer Nature Switzerland},
location = {Cham},
isbn = {978-3-031-61057-8},
doi = {10.1007/978-3-031-61057-8_28},
keywords = {distributed control, key management, organisational digital identity, security, threshold signatures, zero trust},
shorttitle = {The Power of Many},
abstract = {Organisational Digital Identity ({ODI}) often relies on the credentials and keys being controlled by a single person-representative. Moreover, some Information Systems ({IS}) outsource the key management to a third-party controller. Both the centralisation and outsourcing of the keys threaten data integrity within the {IS}, allegedly provided by a trusted organisation. Also, outsourcing the control prevents an organisation from cryptographically enforcing custom policies, e.g. time-based, regarding the data originating from it. To address this, we propose a Distributed Key Management System ({DKMS}) that eliminates the risks associated with centralised control over an organisation’s identity and allows organisation-enforceable policies. The {DKMS} employs threshold signatures to directly involve multiple organisation’s representatives (e.g. employees, {IS} components, and external custodians) in data signing on its behalf. The threshold signature creation and,
therefore, the custom signing policy inclusion, is fully backwards compatible with commonly used signing schemes, such as {RSA} or {ECDSA}. The feasibility of the proposed system is shown in an example data exchange system, X-Road. The implementation confirms the ability of the design to achieve distributed control over the {ODI} during the operational key phase. Excluding a network delay, the implementation introduces less than 200 ms overhead compared to the built-in signing solution.},
editor = {Guizzardi, Giancarlo and Santoro, Flavia and Mouratidis, Haralambos and Soffer, Pnina},
date = {2024},
langid = {english},
}
++
* **Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation**\\ [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:jakub-janku|Jakub Janku]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings of the 19th International Conference on Availability, Reliability and Security//, Association for Computing Machinery, 2024.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], [[:publications:keywords:cryptocurrencies|cryptocurrencies]], [[:publications:keywords:javacard|javacard]], [[:publications:keywords:e-cash|e-cash]], {{:publications:pdf:2024-trustbus-dufka.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3664476.3670889|DOI website]], [[https://doi.org/10.1145/3664476.3670889|paper website]], ++ BibTeX |@InProceedings{2024-trustbus-dufka,
title = {Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation},
author = {Antonin Dufka and Jakub Janku and Petr Svenda},
booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security},
publisher = {Association for Computing Machinery},
year = {2024},
isbn = {9798400717185},
doi = {10.1145/3664476.3670889},
url = {https://doi.org/10.1145/3664476.3670889},
keywords = {smartcards, SMPC, cryptocurrencies, javacard, e-cash},
}
++
* **Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction**\\ [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:michal-muzik|Michal Muzik]], [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:david-smahel|David Smahel]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Computers \& Security//, 2024, 103667.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:authentication|authentication]], [[http://dx.doi.org/https://doi.org/10.1016/j.cose.2023.103667|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404823005771|paper website]], ++ BibTeX |@Article{2024-compsec-kruzikova,
title = {Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction},
author = {Agata Kruzikova and Michal Muzik and Lenka Knapova and Lenka Dedkova and David Smahel and Vashek Matyas},
journal = {Computers \& Security},
volume = {138},
pages = {103667},
year = {2024},
issn = {0167-4048},
doi = {https://doi.org/10.1016/j.cose.2023.103667},
url = {https://www.sciencedirect.com/science/article/pii/S0167404823005771},
keywords = {usablesec, authentication},
}
++
* **pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis**\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:vojtech-suchanek|Vojtech Suchanek]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]] and [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]],\\ //IACR Transactions on Cryptographic Hardware and Embedded Systems//, Ruhr-University of Bochum, 2024, 355–381.\\ Keywords: [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:ecc|ecc]], {{:publications:pdf:2024-ches-jancar.pdf|pre-print PDF}}, [[http://dx.doi.org/10.46586/tches.v2024.i4.355-381|DOI website]], [[https://tches.iacr.org/index.php/TCHES/article/view/11796|paper website]], ++ BibTeX |@InProceedings{2024-ches-jancar,
title = {pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis},
author = {Jan Jancar and Vojtech Suchanek and Petr Svenda and Vladimir Sedlacek and Lukasz Chmielewski},
booktitle = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
publisher = {Ruhr-University of Bochum},
year = {2024},
keywords = {side-channel,ecc},
doi = {10.46586/tches.v2024.i4.355-381},
url = {https://tches.iacr.org/index.php/TCHES/article/view/11796},
pages = {355–381},
}
++
* **sec-certs: Examining the security certification practice for better vulnerability mitigation**\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:jiri-michalik|Jiri Michalik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Computers & Security//, 2024.\\ Keywords: [[:publications:keywords:sec-certs|sec-certs]], [[http://dx.doi.org/10.1016/j.cose.2024.103895|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404824001974|paper website]], ++ BibTeX |@Article{2023-seccerts-janovsky,
title = {sec-certs: Examining the security certification practice for better vulnerability mitigation},
author = {Adam Janovsky and Jan Jancar and Petr Svenda and Lukasz Chmielewski and Jiri Michalik and Vashek Matyas},
journal = {Computers & Security},
volume = {143},
year = {2024},
issn = {0167-4048},
doi = {10.1016/j.cose.2024.103895},
url = {https://www.sciencedirect.com/science/article/pii/S0167404824001974},
keywords = {sec-certs},
}
++
* **“These results must be false”: A usability evaluation of constant-time analysis tools**\\ [[:publications:authors:marcel-fourne|Marcel Fourné]], [[:publications:authors:daniel-de-almeida-braga|Daniel De Almeida Braga]], [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:mohamed-sabt|Mohamed Sabt]], [[:publications:authors:peter-schwabe|Peter Schwabe]], [[:publications:authors:gilles-barthe|Gilles Barthe]], [[:publications:authors:pierre-alain-fouque|Pierre-Alain Fouque]] and [[:publications:authors:yasemin-acar|Yasemin Acar]],\\ //Proceedings of the 33rd USENIX Security Symposium//, USENIX Association, 2024, to appear.\\ Keywords: [[:publications:keywords:constant-time|constant-time]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2024-usenix-jancar.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2024-usenix-jancar,
title = {“These results must be false”: A usability evaluation of constant-time analysis tools},
author = {Marcel Fourné and Daniel De Almeida Braga and Jan Jancar and Mohamed Sabt and Peter Schwabe and Gilles Barthe and Pierre-Alain Fouque and Yasemin Acar},
booktitle = {Proceedings of the 33rd USENIX Security Symposium},
pages = {to appear},
publisher = {USENIX Association},
year = {2024},
keywords = {constant-time, cryptoimplementations, usablesec, libraries, side-channel},
}
++
==== 2023====
* **Enabling Efficient Threshold Signature Computation via Java Card API**\\ [[:publications:authors:antonin-dufka|Antonin Dufka]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings of the 18th International Conference on Availability, Reliability and Security//, Association for Computing Machinery, 2023, 11-20.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], [[:publications:keywords:cryptocurrencies|cryptocurrencies]], [[:publications:keywords:javacard|javacard]], {{:publications:pdf:2023-ares-dufka.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3600160.3600180|DOI website]], ++ BibTeX |@InProceedings{2023-ares-dufka,
title = {Enabling Efficient Threshold Signature Computation via Java Card API},
author = {Antonin Dufka and Petr Svenda},
booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security},
pages = {11-20},
publisher = {Association for Computing Machinery},
year = {2023},
isbn = {9798400707728},
doi = {10.1145/3600160.3600180},
keywords = {smartcards, SMPC, cryptocurrencies, javacard},
}
++
* **Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations**\\ [[:publications:authors:ben-nassi|Ben Nassi]], [[:publications:authors:ofek-vayner|Ofek Vayner]], [[:publications:authors:etay-iluz|Etay Iluz]], [[:publications:authors:dudi-nassi|Dudi Nassi]], [[:publications:authors:or-hai-cohen|Or Hai Cohen]], [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:daniel-genkin|Daniel Genkin]], [[:publications:authors:eran-tromer|Eran Tromer]], [[:publications:authors:boris-zadov|Boris Zadov]] and [[:publications:authors:yuval-elovici|Yuval Elovici]],\\ //30th ACM Conference on Computer and Communications Security (CCS'2023)//, ACM, 2023, 268–280.\\ Keywords: [[:publications:keywords:cryptolibs|cryptolibs]], [[:publications:keywords:leakage|leakage]], [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.1145/3576915.3616620|DOI website]], ++ BibTeX |@InProceedings{2023-ccs-jancar,
title = {Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations},
author = {Ben Nassi and Ofek Vayner and Etay Iluz and Dudi Nassi and Or Hai Cohen and Jan Jancar and Daniel Genkin and Eran Tromer and Boris Zadov and Yuval Elovici},
booktitle = {30th ACM Conference on Computer and Communications Security (CCS'2023)},
pages = {268–280},
publisher = {ACM},
address = {New York, NY, USA},
year = {2023},
isbn = {9798400700507},
doi = {10.1145/3576915.3616620},
keywords = {cryptolibs, leakage, side-channel, cryptoimplementations},
}
++
* **ProMETHEUS: A Secure Lightweight Spectrum Allocation Protocol against SSDF Attacks in Cognitive Radio IoT Networks**\\ [[:publications:authors:milan-patnaik|Milan Patnaik]], [[:publications:authors:k.-bharati|K. Bharati]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //IEEE Commun. Lett.//, 2023, 2919--2923.\\ Keywords: [[:publications:keywords:iot|iot]], [[http://dx.doi.org/10.1109/LCOMM.2023.3317335|DOI website]], [[https://doi.org/10.1109/LCOMM.2023.3317335|paper website]], ++ BibTeX |@Article{dblp:journals/icl/patnaikbm23,
title = {ProMETHEUS: {A} Secure Lightweight Spectrum Allocation Protocol against {SSDF} Attacks in Cognitive Radio IoT Networks},
author = {Milan Patnaik and K. Bharati and Vashek Matyas},
journal = {{IEEE} Commun. Lett.},
volume = {27},
number = {11},
pages = {2919--2923},
year = {2023},
doi = {10.1109/LCOMM.2023.3317335},
url = {https://doi.org/10.1109/LCOMM.2023.3317335},
keywords = {IoT},
}
++
* **SoK: SCA-secure ECC in software - mission impossible?**\\ [[:publications:authors:lejla-batina|Lejla Batina]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:björn-haase|Björn Haase]], [[:publications:authors:niels-samwel|Niels Samwel]] and [[:publications:authors:peter-schwabe|Peter Schwabe]],\\ //IACR Trans. Cryptogr. Hardw. Embed. Syst.//, 2023, 557--589.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:side-channel|side-channel]], [[http://dx.doi.org/10.46586/TCHES.V2023.I1.557-589|DOI website]], ++ BibTeX |@Article{2023-ches-sok,
title = {SoK: SCA-secure {ECC} in software - mission impossible?},
author = {Lejla Batina and Lukasz Chmielewski and Björn Haase and Niels Samwel and Peter Schwabe},
journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
volume = {2023},
number = {1},
pages = {557--589},
year = {2023},
doi = {10.46586/TCHES.V2023.I1.557-589},
keywords = {ECC, side-channel},
}
++
* **The adoption rate of JavaCard features by certified products and open-source projects **\\ [[:publications:authors:lukas-zaoral|Lukas Zaoral]], [[:publications:authors:antonin-dufka|Antonin Dufka]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings of the 22nd Smart Card Research and Advanced Application Conference, Lecture Notes in Computer Science, vol 14530//, Springer, 2023, 169--189.\\ Keywords: [[:publications:keywords:cryptographic-hardware|cryptographic hardware]], [[:publications:keywords:javacard|javacard]], [[:publications:keywords:common-criteria|common criteria]], [[:publications:keywords:fips140|fips140]], [[:publications:keywords:smartcards|smartcards]], [[http://dx.doi.org/10.1007/978-3-031-54409-5_9|DOI website]], ++ BibTeX |@InProceedings{2023-cardis-javacard,
title = {The adoption rate of JavaCard features by certified products and open-source projects },
author = {Lukas Zaoral and Antonin Dufka and Petr Svenda},
booktitle = {Proceedings of the 22nd Smart Card Research and Advanced Application Conference, Lecture Notes in Computer Science, vol 14530},
pages = {169--189},
publisher = {Springer},
year = {2023},
isbn = {978-3-031-54409-5},
doi = {10.1007/978-3-031-54409-5_9},
keywords = {Cryptographic Hardware, javacard, common criteria, fips140, smartcards},
language = {eng},
}
++
==== 2022====
* **A Bad Day to Die Hard: Correcting the Dieharder Battery**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:lubomir-obratil|Lubomir Obratil]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:dusan-klinec|Dusan Klinec]],\\ //Journal of Cryptology//, Springer, 2022, 1--20.\\ Keywords: [[:publications:keywords:dieharder-battery|dieharder battery]], [[:publications:keywords:randomness|randomness]], [[:publications:keywords:p-value|p-value]], [[:publications:keywords:kolmogorov-smirnov-test|kolmogorov-smirnov test]], [[http://dx.doi.org/https://doi.org/10.1007/s00145-021-09414-y|DOI website]], ++ BibTeX |@Article{2022-journalofcryptology-sys,
title = {A Bad Day to Die Hard: Correcting the Dieharder Battery},
author = {Marek Sys and Lubomir Obratil and Vashek Matyas and Dusan Klinec},
journal = {Journal of Cryptology},
volume = {35},
number = {1},
pages = {1--20},
publisher = {Springer},
year = {2022},
doi = {https://doi.org/10.1007/s00145-021-09414-y},
keywords = {Dieharder battery, randomness, p-value, Kolmogorov-Smirnov test},
}
++
* **A Longitudinal Study of Cryptographic API: A Decade of Android Malware**\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:davide-maiorca|Davide Maiorca]], [[:publications:authors:dominik-macko|Dominik Macko]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:giorgio-giacinto|Giorgio Giacinto]],\\ //Proceedings of the 19th International Conference on Security and Cryptography//, 2022, 121--133.\\ Keywords: [[:publications:keywords:cryptolibs|cryptolibs]], [[:publications:keywords:malware|malware]], [[:publications:keywords:android|android]], [[https://github.com/adamjanovsky/AndroidMalwareCrypto|paper website]], ++ BibTeX |@InProceedings{2022-secrypt-janovsky,
title = {{A Longitudinal Study of Cryptographic API: A Decade of Android Malware}},
author = {Adam Janovsky and Davide Maiorca and Dominik Macko and Vashek Matyas and Giorgio Giacinto},
booktitle = {Proceedings of the 19th International Conference on Security and Cryptography},
pages = {121--133},
year = {2022},
isbn = {978-989-758-590-6},
issn = {2184-7711},
url = {https://github.com/adamjanovsky/AndroidMalwareCrypto},
keywords = {cryptolibs, malware, Android},
}
++
* **Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:michaela-balazova|Michaela Balážová]], [[:publications:authors:pavol-zacik|Pavol Žáčik]], [[:publications:authors:eric-vincent-valcik|Eric Vincent Valčík]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 2022 European Symposium on Usable Security//, ACM, 2022, 131-144.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2022-eurousec-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3549015.3554296|DOI website]], ++ BibTeX |@InProceedings{2022-eurousec-ukrop,
title = {Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors},
author = {Martin Ukrop and Michaela Balážová and Pavol Žáčik and Eric Vincent Valčík and Vashek Matyas},
booktitle = {Proceedings of the 2022 European Symposium on Usable Security},
series = {EuroUSEC '22},
pages = {131-144},
publisher = {ACM},
location = {Karlsruhe, Germany},
year = {2022},
doi = {10.1145/3549015.3554296},
keywords = {usablesec, Red-Hat},
}
++
* **Comparing Nonresponders and Responders of Online Intercept Surveys: A Large-Scale Experimental ICT Security-Related Study**\\ [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:david-smahel|David Smahel]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Human Behavior and Emerging Technologies//, Hindawi, 2022, 3107621.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[http://dx.doi.org/10.1155/2022/3107621|DOI website]], [[https://doi.org/10.1155/2022/3107621|paper website]], ++ BibTeX |@Article{2022-hbet-knapova,
title = {Comparing Nonresponders and Responders of Online Intercept Surveys: A Large-Scale Experimental ICT Security-Related Study},
author = {Lenka Knapova and David Smahel and Lenka Dedkova and Vashek Matyas},
journal = {Human Behavior and Emerging Technologies},
volume = {2022},
pages = {3107621},
publisher = {Hindawi},
year = {2022},
issn = {2578-1863},
doi = {10.1155/2022/3107621},
url = {https://doi.org/10.1155/2022/3107621},
keywords = {usablesec},
month = {July},
day = {28},
}
++
* **DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:vojtech-suchanek|Vojtech Suchanek]], [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Progress in Cryptology - AFRICACRYPT 2022//, Springer Nature Switzerland, 2022, 493-517.\\ {{:publications:pdf:2022-africacrypt-sedlacek.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-031-17433-9_21|DOI website]], ++ BibTeX |@InProceedings{2022-africacrypt-sedlacek,
title = {DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits},
author = {Vladimir Sedlacek and Vojtech Suchanek and Antonin Dufka and Marek Sys and Vashek Matyas},
booktitle = {Progress in Cryptology - AFRICACRYPT 2022},
pages = {493-517},
publisher = {Springer Nature Switzerland},
address = {Cham},
year = {2022},
isbn = {978-3-031-17433-9},
doi = {10.1007/978-3-031-17433-9_21},
}
++
* **Even if users do not read security directives, their behavior is not so catastrophic**\\ [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:kamil-malinka|Kamil Malinka]], [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:lenka-knapova|Lenka Knapova]] and [[:publications:authors:agata-kruzikova|Agata Kruzikova]],\\ //Communications of the ACM//, ACM, 2022, 37--40.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:directive|directive]], [[http://dx.doi.org/10.1145/3471928|DOI website]], ++ BibTeX |@Article{2022-cacm-matyas,
title = {Even if users do not read security directives, their behavior is not so catastrophic},
author = {Vashek Matyas and Kamil Malinka and Lydia Kraus and Lenka Knapova and Agata Kruzikova},
journal = {Communications of the ACM},
volume = {65},
number = {1},
pages = {37--40},
publisher = {ACM},
year = {2022},
doi = {10.1145/3471928},
keywords = {usablesec, directive},
}
++
* **Experience with Abrupt Transition to Remote Teaching of Embedded Systems**\\ [[:publications:authors:jan-koniarik|Jan Koniarik]], [[:publications:authors:daniel-dlhopolcek|Daniel Dlhopolcek]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Proceedings of the 2022 ACM Conference on Innovation and Technology in Computer Science Education//, ACM, 2022.\\ {{:publications:pdf:2022-iticse-koniarik.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3502718.3524821|DOI website]], [[https://github.com/koniarik/teaching-embedded-remotely|paper website]], ++ BibTeX |@InProceedings{2022-iticse-koniarik,
title = {Experience with Abrupt Transition to Remote Teaching of Embedded Systems},
author = {Jan Koniarik and Daniel Dlhopolcek and Martin Ukrop},
booktitle = {Proceedings of the 2022 ACM Conference on Innovation and Technology in Computer Science Education},
series = {ITiCSE ’22},
publisher = {ACM},
location = {Dublin, Ireland},
year = {2022},
doi = {10.1145/3502718.3524821},
url = {https://github.com/koniarik/teaching-embedded-remotely},
}
++
* **JCAlgTest: Robust identification metadata for certified smartcards**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:rudolf-kvasnovsky|Rudolf Kvasnovsky]], [[:publications:authors:imrich-nagy|Imrich Nagy]] and [[:publications:authors:antonin-dufka|Antonin Dufka]],\\ //19th International Conference on Security and Cryptography//, INSTICC, 2022, 597--604.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:javacard|javacard]], [[http://dx.doi.org/10.5220/0000163500003283|DOI website]], ++ BibTeX |@InProceedings{2022-jcalgtest-svenda,
title = {JCAlgTest: Robust identification metadata for certified smartcards},
author = {Petr Svenda and Rudolf Kvasnovsky and Imrich Nagy and Antonin Dufka},
booktitle = {19th International Conference on Security and Cryptography},
pages = {597--604},
publisher = {INSTICC},
address = {Lisabon},
location = {Lisabon},
year = {2022},
isbn = {978-989-758-590-6},
doi = {10.5220/0000163500003283},
keywords = {smartcards, javacard},
language = {eng},
}
++
* **Large-scale randomness study of security margins for 100+ cryptographic functions**\\ [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:karel-kubicek|Karel Kubicek]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ INSTICC, 2022, 134--146.\\ [[http://dx.doi.org/10.5220/0000163500003283|DOI website]], ++ BibTeX |@InProceedings{2022-securitymargins-secrypt,
title = {Large-scale randomness study of security margins for 100+ cryptographic functions},
author = {Dusan Klinec and Marek Sys and Karel Kubicek and Petr Svenda and Vashek Matyas},
pages = {134--146},
publisher = {INSTICC},
location = {Lisabon},
year = {2022},
isbn = {978-989-758-590-6},
doi = {10.5220/0000163500003283},
conference = {19th International Conference on Security and Cryptography (SECRYPT 2022)},
language = {eng},
}
++
* **Protecting the Most Significant Bits in Scalar Multiplication Algorithms**\\ [[:publications:authors:estuardo-alpirez-bock|Estuardo Alpirez Bock]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]] and [[:publications:authors:konstantina-miteloudi|Konstantina Miteloudi]],\\ //Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings//, Springer, 2022, volume 13783 of Lecture Notes in Computer Science, 118--137.\\ [[http://dx.doi.org/10.1007/978-3-031-22829-2\_7|DOI website]], ++ BibTeX |@InProceedings{2022-space-msb,
title = {Protecting the Most Significant Bits in Scalar Multiplication Algorithms},
author = {Estuardo Alpirez Bock and Lukasz Chmielewski and Konstantina Miteloudi},
booktitle = {Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, {SPACE} 2022, Jaipur, India, December 9-12, 2022, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {13783},
pages = {118--137},
publisher = {Springer},
year = {2022},
doi = {10.1007/978-3-031-22829-2\_7},
}
++
* **SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes**\\ [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings of the 19th International Conference on Security and Cryptography//, SCITEPRESS, 2022, 305-316.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], [[:publications:keywords:cryptocurrencies|cryptocurrencies]], {{:publications:pdf:2022-secrypt-shine.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0011145600003283|DOI website]], ++ BibTeX |@InProceedings{2022-secrypt-shine,
title = {SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes},
author = {Antonin Dufka and Vladimir Sedlacek and Petr Svenda},
booktitle = {Proceedings of the 19th International Conference on Security and Cryptography},
pages = {305-316},
publisher = {SCITEPRESS},
year = {2022},
isbn = {978-989-758-590-6},
issn = {2184-7711},
doi = {10.5220/0011145600003283},
keywords = {smartcards, SMPC, cryptocurrencies},
}
++
* **Usability Insights from Establishing TLS Connections**\\ [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:matej-grabovsky|Matej Grabovsky]], [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:katarina-galanska|Katarina Galanska]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ICT Systems Security and Privacy Protection//, Springer International Publishing, 2022.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2022-ifipsec-kraus.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-031-06975-8_17|DOI website]], ++ BibTeX |@InProceedings{2022-ifipsec-kraus,
title = {Usability Insights from Establishing TLS Connections},
author = {Lydia Kraus and Matej Grabovsky and Martin Ukrop and Katarina Galanska and Vashek Matyas},
booktitle = {ICT Systems Security and Privacy Protection},
series = {IFIP Advances in Information and Communication Technology},
publisher = {Springer International Publishing},
year = {2022},
doi = {10.1007/978-3-031-06975-8_17},
keywords = {usablesec},
}
++
* **Usable and secure? User perception of four authentication methods for mobile banking**\\ [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:david-smahel|David Smahel]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Computers \& Security//, 2022, 102603.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:tacr|tacr]], [[:publications:keywords:authentication|authentication]], [[http://dx.doi.org/10.1016/j.cose.2022.102603|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404822000025|paper website]], ++ BibTeX |@Article{2022-compsec-kruzikova,
title = {Usable and secure? User perception of four authentication methods for mobile banking},
author = {Agata Kruzikova and Lenka Knapova and David Smahel and Lenka Dedkova and Vashek Matyas},
journal = {Computers \& Security},
volume = {115},
pages = {102603},
year = {2022},
issn = {0167-4048},
doi = {10.1016/j.cose.2022.102603},
url = {https://www.sciencedirect.com/science/article/pii/S0167404822000025},
keywords = {usablesec, TACR, authentication},
}
++
* **“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks**\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:marcel-fourne|Marcel Fourné]], [[:publications:authors:daniel-de-almeida-braga|Daniel De Almeida Braga]], [[:publications:authors:mohamed-sabt|Mohamed Sabt]], [[:publications:authors:peter-schwabe|Peter Schwabe]], [[:publications:authors:gilles-barthe|Gilles Barthe]], [[:publications:authors:pierre-alain-fouque|Pierre-Alain Fouque]] and [[:publications:authors:yasemin-acar|Yasemin Acar]],\\ //43rd IEEE Symposium on Security and Privacy//, IEEE, 2022.\\ Keywords: [[:publications:keywords:constant-time|constant-time]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2022-sp-jancar.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2022-sp-jancar,
title = {“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks},
author = {Jan Jancar and Marcel Fourné and Daniel De Almeida Braga and Mohamed Sabt and Peter Schwabe and Gilles Barthe and Pierre-Alain Fouque and Yasemin Acar},
booktitle = {43rd IEEE Symposium on Security and Privacy},
publisher = {IEEE},
address = {San Francisco},
location = {San Francisco},
year = {2022},
keywords = {constant-time, cryptoimplementations, usablesec, libraries, side-channel},
language = {eng},
}
++
==== 2021====
* **A formula for disaster: a unified approach to elliptic curve special-point-based attacks**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jesus-javier-chi-dominguez|Jesús-Javier Chi-Domínguez]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:billy-bob-brumley|Billy Bob Brumley]],\\ //Advances in Cryptology – ASIACRYPT 2021//, Springer, 2021.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2021-asiacrypt-formulas.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2021-asiacrypt-formulas,
title = {A formula for disaster: a unified approach to elliptic curve special-point-based attacks},
author = {Vladimir Sedlacek and Jesús-Javier Chi-Domínguez and Jan Jancar and Billy Bob Brumley},
booktitle = {Advances in Cryptology – ASIACRYPT 2021},
publisher = {Springer},
year = {2021},
isbn = {978-3-030-64837-4},
keywords = {ECC, cryptoimplementations, libraries, side-channel},
}
++
* **Challenges Faced by Teaching Assistants in Computer Science Education Across Europe**\\ [[:publications:authors:emma-riese|Emma Riese]], [[:publications:authors:madeleine-loras|Madeleine Loras]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:tomas-effenberger|Tomas Effenberger]],\\ //Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education//, ACM, 2021.\\ {{:publications:pdf:2021-iticse-riese.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3430665.3456304|DOI website]], ++ BibTeX |@InProceedings{2021-iticse-riese,
title = {Challenges Faced by Teaching Assistants in Computer Science Education Across Europe},
author = {Emma Riese and Madeleine Loras and Martin Ukrop and Tomas Effenberger},
booktitle = {Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education},
series = {ITiCSE ’21},
publisher = {ACM},
location = {Padeborn, Germany},
year = {2021},
doi = {10.1145/3430665.3456304},
}
++
* **How Do Users Chain Email Accounts Together?**\\ [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:maria-svidronova|Maria Svidronova]] and [[:publications:authors:elizabeth-stobert|Elizabeth Stobert]],\\ //IFIP International Conference on ICT Systems Security and Privacy Protection//, Springer, Cham, 2021, .\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2021-ifipsec-kraus.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2021-ifipsec-kraus,
title = {How Do Users Chain Email Accounts Together?},
author = {Lydia Kraus and Maria Svidronova and Elizabeth Stobert},
booktitle = {IFIP International Conference on ICT Systems Security and Privacy Protection},
pages = {},
publisher = {Springer, Cham},
year = {2021},
keywords = {usablesec},
}
++
* **The Stack: Unplugged Activities for Teaching Computer Science (poster)**\\ [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Proceedings of the 52nd ACM Technical Symposium on Computer Science Education//, ACM, 2021.\\ {{:publications:pdf:2021-sigcse-svabensky.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3408877.3439569|DOI website]], ++ BibTeX |@InProceedings{2021-sigcse-svabensky,
title = {The Stack: Unplugged Activities for Teaching Computer Science (poster)},
author = {Valdemar Svabensky and Martin Ukrop},
booktitle = {Proceedings of the 52nd ACM Technical Symposium on Computer Science Education},
series = {SIGCSE ’21},
publisher = {ACM},
location = {Virtual},
year = {2021},
isbn = {978-1-4503-8062-1},
doi = {10.1145/3408877.3439569},
}
++
* **Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior**\\ [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]] and [[:publications:authors:david-smahel|David Smahel]],\\ //Cyberpsychology, Behavior, and Social Networking//, Mary Ann Liebert, Inc., 2021, 584-592.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[https://www.liebertpub.com/doi/full/10.1089/cyber.2020.0599|paper website]], ++ BibTeX |@Article{2021-cyberpsychology-knapova,
title = {Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior},
author = {Lenka Knapova and Agata Kruzikova and Lenka Dedkova and David Smahel},
journal = {Cyberpsychology, Behavior, and Social Networking},
pages = {584-592},
publisher = {Mary Ann Liebert, Inc.},
year = {2021},
url = {https://www.liebertpub.com/doi/full/10.1089/cyber.2020.0599},
keywords = {usablesec},
}
++
==== 2020====
* **Biased RSA private keys: Origin attribution of GCD-factorable keys**\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:peter-sekan|Peter Sekan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //25th European Symposium on Research in Computer Security (ESORICS) 2020//, Springer, 2020.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:bias|bias]], [[:publications:keywords:classification|classification]], [[:publications:keywords:smartcard|smartcard]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], ++ BibTeX |@InProceedings{2020-esorics-privrsabias,
title = {Biased RSA private keys: Origin attribution of GCD-factorable keys},
author = {Adam Janovsky and Matus Nemec and Petr Svenda and Peter Sekan and Vashek Matyas},
booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020},
publisher = {Springer},
year = {2020},
keywords = {RSA, bias, classification, smartcard, cryptoimplementations},
}
++
* **Evolution of SSL/TLS Indicators and Warnings in Web Browsers**\\ [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:tobias-fiebig|Tobias Fiebig]],\\ //27th International Workshop on Security Protocols (SPW 2019)//, Springer International Publishing, 2020, 267--280.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2019-spw-kraus.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-57043-9_25|DOI website]], ++ BibTeX |@InProceedings{2019-spw-kraus,
title = {Evolution of SSL/TLS Indicators and Warnings in Web Browsers},
author = {Lydia Kraus and Martin Ukrop and Vashek Matyas and Tobias Fiebig},
booktitle = {27th International Workshop on Security Protocols (SPW 2019)},
pages = {267--280},
publisher = {Springer International Publishing},
year = {2020},
doi = {10.1007/978-3-030-57043-9_25},
keywords = {usablesec},
}
++
* **Fooling primality tests on smartcards**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //25th European Symposium on Research in Computer Security (ESORICS) 2020//, Springer, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:primality|primality]], [[:publications:keywords:pseudoprimes|pseudoprimes]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2020-esorics-foolingprimes.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-59013-0\_11|DOI website]], ++ BibTeX |@InProceedings{2020-esorics-foolingprimes,
title = {Fooling primality tests on smartcards},
author = {Vladimir Sedlacek and Jan Jancar and Petr Svenda},
booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020},
publisher = {Springer},
year = {2020},
doi = {10.1007/978-3-030-59013-0\_11},
keywords = {ECC, primality, pseudoprimes, smartcards, cryptoimplementations},
}
++
* **JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets**\\ [[:publications:authors:vasilios-mavroudis|Vasilios Mavroudis]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ IEEE, 2020, 64--71.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:opentools|opentools]], [[:publications:keywords:smpc|smpc]], [[http://dx.doi.org/10.1109/EuroSPW51379.2020.00022|DOI website]], ++ BibTeX |@Article{2020-jcmathlib-cybercert,
title = {JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets},
author = {Vasilios Mavroudis and Petr Svenda},
volume = {61},
number = {2},
pages = {64--71},
publisher = {IEEE},
year = {2020},
doi = {10.1109/EuroSPW51379.2020.00022},
keywords = {ECC, smartcards, opentools, smpc},
conference = {First International Workshop on Lightweight and Incremental Cybersecurity Certification},
}
++
* **Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces**\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:marek-sys|Marek Sys]],\\ //Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020//, Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:leakage|leakage]], [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.13154/tches.v2020.i4.281-308|DOI website]], ++ BibTeX |@InProceedings{2020-tches-minerva,
title = {Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces},
author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys},
booktitle = {Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020},
publisher = {Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems},
year = {2020},
issn = {2569-2925},
doi = {10.13154/tches.v2020.i4.281-308},
keywords = {ECC, smartcards, libraries, leakage, side-channel, cryptoimplementations},
}
++
* **Privacy-Friendly Monero Transaction Signing on a Hardware Wallet**\\ [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings//, Springer, 2020, volume 580 of {IFIP} Advances in Information and Communication Technology, 338--351.\\ Keywords: [[:publications:keywords:monero|monero]], [[:publications:keywords:bulletproofs|bulletproofs]], [[:publications:keywords:hardware-wallets|hardware wallets]], [[:publications:keywords:cryptocurrencies|cryptocurrencies]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2020-ifipsec-klinec.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-58201-2\_23|DOI website]], ++ BibTeX |@InProceedings{2020-ifipsec-klinec,
title = {Privacy-Friendly Monero Transaction Signing on a Hardware Wallet},
author = {Dusan Klinec and Vashek Matyas},
booktitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {580},
pages = {338--351},
publisher = {Springer},
year = {2020},
doi = {10.1007/978-3-030-58201-2\_23},
keywords = {Monero, Bulletproofs, hardware wallets, cryptocurrencies, cryptoimplementations},
}
++
* **Privacy-Friendly Monero Transaction Signing on a Hardware Wallet**\\ [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings//, Springer, 2020, volume 580 of {IFIP} Advances in Information and Communication Technology, 338--351.\\ Keywords: [[:publications:keywords:monero|monero]], [[:publications:keywords:bulletproofs|bulletproofs]], [[:publications:keywords:hardware-wallets|hardware wallets]], [[:publications:keywords:cryptocurrency|cryptocurrency]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:smpc|smpc]], {{:publications:pdf:2020-ifipsec-klinec.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-58201-2\_23|DOI website]], ++ BibTeX |@InProceedings{2020-ifipsec-klinec,
title = {Privacy-Friendly Monero Transaction Signing on a Hardware Wallet},
author = {Dusan Klinec and Vashek Matyas},
booktitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {580},
pages = {338--351},
publisher = {Springer},
year = {2020},
doi = {10.1007/978-3-030-58201-2\_23},
keywords = {Monero, Bulletproofs, hardware wallets, cryptocurrency, cryptoimplementations, SMPC},
}
++
* **Teaching Lab: Training Novice Computer Science Teachers (poster)**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:imrich-nagy|Imrich Nagy]],\\ //Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education//, ACM, 2020.\\ {{:publications:pdf:2020-iticse-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3341525.3393967|DOI website]], ++ BibTeX |@InProceedings{2020-iticse-ukrop,
title = {Teaching Lab: Training Novice Computer Science Teachers (poster)},
author = {Martin Ukrop and Valdemar Svabensky and Imrich Nagy},
booktitle = {Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education},
series = {ITiCSE ’20},
publisher = {ACM},
location = {Trondheim, Norway},
year = {2020},
isbn = {978-1-4503-6874-2},
doi = {10.1145/3341525.3393967},
}
++
* **User Testing of Mobile Banking Authentication Methods: UX Testing, User Interviews and Quantitative Survey**\\ [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:ondrej-gabrhelik|Ondrej Gabrhelik]], [[:publications:authors:david-smahel|David Smahel]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:petr-dolezal|Petr Dolezal]] and [[:publications:authors:martina-smahelova|Martina Smahelova]],\\ Technical report, Masaryk University, 2020.\\ {{:publications:pdf:2020-tacr-report.pdf|pre-print PDF}}, ++ BibTeX |@TechReport{2020-tacr-report,
title = {User Testing of Mobile Banking Authentication Methods: UX Testing, User Interviews and Quantitative Survey},
author = {Agata Kruzikova and Lenka Knapova and Ondrej Gabrhelik and David Smahel and Lenka Dedkova and Vashek Matyas and Petr Dolezal and Martina Smahelova},
publisher = {Technical report, Masaryk University},
year = {2020},
}
++
* **Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:lydia-kraus|Lydia Kraus]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Digital Threats: Research and Practice//, Association for Computing Machinery, 2020.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2020-dtrap-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3419472|DOI website]], ++ BibTeX |@Article{2020-dtrap-ukrop,
title = {Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)},
author = {Martin Ukrop and Lydia Kraus and Vashek Matyas},
journal = {Digital Threats: Research and Practice},
volume = {1},
number = {4},
numpages = {30},
publisher = {Association for Computing Machinery},
year = {2020},
issn = {2692-1626},
doi = {10.1145/3419472},
keywords = {usablesec, Red-Hat},
}
++
==== 2019====
* **BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:karel-kubicek|Karel Kubicek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //E-Business and Telecommunications//, Springer International Publishing, 2019, 123--149.\\ Keywords: [[:publications:keywords:randomness|randomness]], [[:publications:keywords:hypothesis|hypothesis]], [[:publications:keywords:boolean|boolean]], ++ BibTeX |@InProceedings{2019-secrypt2017selected-sys,
title = {BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256},
author = {Marek Sys and Dusan Klinec and Karel Kubicek and Petr Svenda},
booktitle = {E-Business and Telecommunications},
pages = {123--149},
publisher = {Springer International Publishing},
address = {Cham},
year = {2019},
isbn = {978-3-030-11039-0},
keywords = {randomness, hypothesis, boolean},
editor = {Obaidat, Mohammad S. and Cabello, Enrique},
}
++
* **Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques**\\ [[:publications:authors:vojtech-mrazek|Vojtech Mrazek]], [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //IEEE Transactions on Very Large Scale Integration (VLSI) Systems//, IEEE, 2019.\\ Keywords: [[:publications:keywords:fpga|fpga]], [[:publications:keywords:genetic-algorithms|genetic-algorithms]], [[:publications:keywords:randomness|randomness]], [[:publications:keywords:distinguishers|distinguishers]], [[http://dx.doi.org/10.1109/TVLSI.2019.2923848|DOI website]], ++ BibTeX |@InProceedings{2019-ieeevsli-mrazek,
title = {Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques},
author = {Vojtech Mrazek and Marek Sys and Petr Svenda},
booktitle = {IEEE Transactions on Very Large Scale Integration (VLSI) Systems},
publisher = {IEEE},
year = {2019},
issn = {1557-9999},
doi = {10.1109/TVLSI.2019.2923848},
keywords = {FPGA, genetic-algorithms, randomness, distinguishers},
}
++
* **Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks**\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:pierre-louis-palant|Pierre-Louis Palant]],\\ //Sensors//, Multidisciplinary Digital Publishing Institute, 2019.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.3390/s19040914|DOI website]], [[http://www.mdpi.com/1424-8220/19/4/914|paper website]], ++ BibTeX |@Article{2019-sensors-nemec,
title = {Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks},
author = {Lukas Nemec and Vashek Matyas and Radim Ostadal and Petr Svenda and Pierre-Louis Palant},
journal = {Sensors},
volume = {19},
number = {4},
publisher = {Multidisciplinary Digital Publishing Institute},
year = {2019},
issn = {1424-8220},
doi = {10.3390/s19040914},
url = {http://www.mdpi.com/1424-8220/19/4/914},
keywords = {WSN},
}
++
* **I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT//, SciTePress, 2019, 25-36.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:factorization|factorization]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2019-secrypt-sedlacek.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0007786600250036|DOI website]], ++ BibTeX |@Conference{2019-secrypt-sedlacek,
title = {I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability},
author = {Vladimir Sedlacek and Dusan Klinec and Marek Sys and Petr Svenda and Vashek Matyas},
booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT},
pages = {25-36},
organization = {INSTICC},
publisher = {SciTePress},
year = {2019},
isbn = {978-989-758-378-0},
doi = {10.5220/0007786600250036},
keywords = {ECC, factorization, smartcards, cryptoimplementations},
}
++
* **Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem**\\ [[:publications:authors:stefano-calzavara|Stefano Calzavara]], [[:publications:authors:riccardo-focardi|Riccardo Focardi]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:alvise-rabitti|Alvise Rabitti]] and [[:publications:authors:marco-squarcina|Marco Squarcina]],\\ //2019 IEEE Symposium on Security and Privacy (SP)//, IEEE, 2019.\\ [[http://dx.doi.org/10.1109/sp.2019.00053|DOI website]], ++ BibTeX |@InProceedings{2019-sp-calzavara,
title = {Postcards from the Post-{HTTP} World: Amplification of {HTTPS} Vulnerabilities in the Web Ecosystem},
author = {Stefano Calzavara and Riccardo Focardi and Matus Nemec and Alvise Rabitti and Marco Squarcina},
booktitle = {2019 {IEEE} Symposium on Security and Privacy ({SP})},
publisher = {IEEE},
year = {2019},
doi = {10.1109/sp.2019.00053},
}
++
* **Reflective Diary for Professional Development of Novice Teachers**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:jan-nehyba|Jan Nehyba]],\\ //Proceedings of the 50th ACM Technical Symposium on Computer Science Education//, ACM, 2019, 1088--1094.\\ {{:publications:pdf:2019-sigcse-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3287324.3287448|DOI website]], ++ BibTeX |@InProceedings{2019-sigcse-ukrop,
title = {Reflective Diary for Professional Development of Novice Teachers},
author = {Martin Ukrop and Valdemar Svabensky and Jan Nehyba},
booktitle = {Proceedings of the 50th ACM Technical Symposium on Computer Science Education},
series = {SIGCSE '19},
pages = {1088--1094},
publisher = {ACM},
address = {New York, NY, USA},
year = {2019},
isbn = {978-1-4503-5890-3},
doi = {10.1145/3287324.3287448},
}
++
* **Will You Trust This TLS Certificate? Perceptions of People Working in IT**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:heider-ahmad-mutleq-wahsheh|Heider Ahmad Mutleq Wahsheh]],\\ //Proceedings of the 35rd Annual Computer Security Applications Conference (ACSAC'2019)//, ACM, 2019.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2019-acsac-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3359789.3359800|DOI website]], ++ BibTeX |@InProceedings{2019-acsac-ukrop,
title = {Will You Trust This TLS Certificate? Perceptions of People Working in IT},
author = {Martin Ukrop and Lydia Kraus and Vashek Matyas and Heider Ahmad Mutleq Wahsheh},
booktitle = {Proceedings of the 35rd Annual Computer Security Applications Conference (ACSAC'2019)},
publisher = {ACM},
year = {2019},
doi = {10.1145/3359789.3359800},
keywords = {usablesec, Red-Hat},
}
++
==== 2018====
* **A Large-scale Comparative Study of Beta Testers and Regular Users**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Communications of the ACM//, ACM, 2018, 64--71.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], {{:publications:pdf:2018-cacm-stavova.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3173570|DOI website]], ++ BibTeX |@Article{2018-cacm-stavova,
title = {A Large-scale Comparative Study of Beta Testers and Regular Users},
author = {Vlasta Stavova and Lenka Dedkova and Martin Ukrop and Vashek Matyas},
journal = {Communications of the ACM},
volume = {61},
number = {2},
pages = {64--71},
publisher = {ACM},
year = {2018},
doi = {10.1145/3173570},
keywords = {usablesec, ESET},
}
++
* **Adaptive Secrecy Amplification with Radio Channel Key Extraction**\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS)//, 2018, 123-130.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1109/DCOSS.2018.00028|DOI website]], ++ BibTeX |@InProceedings{2018-dcoss-nemec,
title = {Adaptive Secrecy Amplification with Radio Channel Key Extraction},
author = {Lukas Nemec and Radim Ostadal and Vashek Matyas and Petr Svenda},
booktitle = {2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS)},
pages = {123-130},
year = {2018},
issn = {2325-2944},
doi = {10.1109/DCOSS.2018.00028},
keywords = {WSN},
}
++
* **Entropy Crowdsourcing -- Protocols for Link Key Updates in Wireless Sensor Networks**\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Security Protocols Workshop XXVI//, Springer International Publishing, 2018, 84-92.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2018-spw-nemec,
title = {Entropy Crowdsourcing -- Protocols for Link Key Updates in Wireless Sensor Networks},
author = {Lukas Nemec and Radim Ostadal and Vashek Matyas and Petr Svenda},
booktitle = {Security Protocols Workshop XXVI},
pages = {84-92},
publisher = {Springer International Publishing},
year = {2018},
isbn = {978-3-030-03251-7},
keywords = {WSN},
}
++
* **Evolving Boolean Functions for Fast and Efficient Randomness Testing**\\ [[:publications:authors:vojtech-mrazek|Vojtech Mrazek]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:zdenek-vasicek|Zdenek Vasicek]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '18)//, Association for Computing Machinery, 2018, 1302--1309.\\ [[http://dx.doi.org/10.1145/3205455.3205518|DOI website]], ++ BibTeX |@InProceedings{2018-gecco-mrazek,
title = {Evolving Boolean Functions for Fast and Efficient Randomness Testing},
author = {Vojtech Mrazek and Marek Sys and Zdenek Vasicek and Lukas Sekanina and Vashek Matyas},
booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '18)},
pages = {1302--1309},
publisher = {Association for Computing Machinery},
location = {Kyoto, JP},
year = {2018},
isbn = {978-1-4503-5618-3},
doi = {10.1145/3205455.3205518},
}
++
* **Experimental large-scale review of attractors for detection of potentially unwanted applications**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:mike-just|Mike Just]], [[:publications:authors:david-smahel|David Smahel]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Computers \& Security//, 2018, 92--100.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1016/j.cose.2018.02.017|DOI website]], [[http://www.sciencedirect.com/science/article/pii/S0167404818301640|paper website]], ++ BibTeX |@Article{2018-compsec-statova,
title = {Experimental large-scale review of attractors for detection of potentially unwanted applications},
author = {Vlasta Stavova and Lenka Dedkova and Vashek Matyas and Mike Just and David Smahel and Martin Ukrop},
journal = {Computers \& Security},
volume = {76},
pages = {92--100},
year = {2018},
issn = {0167-4048},
doi = {10.1016/j.cose.2018.02.017},
url = {http://www.sciencedirect.com/science/article/pii/S0167404818301640},
keywords = {usablesec, ESET, GAMU},
}
++
* **Why Johnny the Developer Can't Work with Public Key Certificates: An Experimental Study of OpenSSL Usability**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Topics in Cryptology -- CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018//, Springer International Publishing, 2018, 45--64.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2018-rsa-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-319-76953-0_3|DOI website]], ++ BibTeX |@InBook{2018-rsa-ukrop,
title = {Why Johnny the Developer Can't Work with Public Key Certificates: An Experimental Study of OpenSSL Usability},
author = {Martin Ukrop and Vashek Matyas},
booktitle = {Topics in Cryptology -- CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018},
pages = {45--64},
publisher = {Springer International Publishing},
year = {2018},
doi = {10.1007/978-3-319-76953-0_3},
keywords = {usablesec, Red-Hat},
}
++
==== 2017====
* **A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components**\\ [[:publications:authors:vasilios-mavroudis|Vasilios Mavroudis]], [[:publications:authors:andrea-cerulli|Andrea Cerulli]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:dan-cvrcek|Dan Cvrcek]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:george-danezis|George Danezis]],\\ //24th ACM Conference on Computer and Communications Security (CCS'2017)//, ACM, 2017, 1583--1600.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], ++ BibTeX |@InProceedings{2017-ccs-mavroudis,
title = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components},
author = {Vasilios Mavroudis and Andrea Cerulli and Petr Svenda and Dan Cvrcek and Dusan Klinec and George Danezis},
booktitle = {24th ACM Conference on Computer and Communications Security (CCS'2017)},
pages = {1583--1600},
publisher = {ACM},
year = {2017},
isbn = {978-1-4503-4946-8/17/10},
keywords = {smartcards, SMPC},
}
++
* **Factors Influencing the Purchase of Security Software for Mobile Devices -- Case Study**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:mike-just|Mike Just]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Infocommunications Journal//, 2017, 18--23.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], {{:publications:pdf:2017-infocomm-stavova.pdf|pre-print PDF}}, [[http://www.infocommunications.hu/2017_1|paper website]], ++ BibTeX |@Article{2017-infocomm-stavova,
title = {Factors Influencing the Purchase of Security Software for Mobile Devices -- Case Study},
author = {Vlasta Stavova and Vashek Matyas and Mike Just and Martin Ukrop},
journal = {Infocommunications Journal},
volume = {9},
issue = {1},
pages = {18--23},
year = {2017},
url = {http://www.infocommunications.hu/2017_1},
keywords = {usablesec, ESET, GAMU},
}
++
* **Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans**\\ [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:peter-sekan|Peter Sekan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)//, ACM, 2017.\\ Keywords: [[:publications:keywords:cryptolibs|cryptolibs]], [[:publications:keywords:rsa|rsa]], [[:publications:keywords:fingerprinting|fingerprinting]], [[:publications:keywords:smartcard|smartcard]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.1145/3134600.3134612|DOI website]], ++ BibTeX |@InProceedings{2017-acsac-nemec,
title = {Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans},
author = {Matus Nemec and Dusan Klinec and Petr Svenda and Peter Sekan and Vashek Matyas},
booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)},
publisher = {ACM},
year = {2017},
doi = {10.1145/3134600.3134612},
keywords = {cryptolibs, RSA, fingerprinting, smartcard, cryptoimplementations},
}
++
* **The Efficient Randomness Testing using Boolean Functions**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //The 14th International Conference on Security and Cryptography (Secrypt'2017)//, SCITEPRESS, 2017, 92--103.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], ++ BibTeX |@InProceedings{2017-secrypt-sys,
title = {The Efficient Randomness Testing using Boolean Functions},
author = {Marek Sys and Dusan Klinec and Petr Svenda},
booktitle = {The 14th International Conference on Security and Cryptography (Secrypt'2017)},
pages = {92--103},
publisher = {SCITEPRESS},
year = {2017},
isbn = {978-989-758-259-2},
keywords = {eacirc, randomness},
}
++
* **The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli**\\ [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //24th ACM Conference on Computer and Communications Security (CCS'2017)//, ACM, 2017, 1631--1648.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], ++ BibTeX |@InProceedings{2017-ccs-nemec,
title = {The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli},
author = {Matus Nemec and Marek Sys and Petr Svenda and Dusan Klinec and Vashek Matyas},
booktitle = {24th ACM Conference on Computer and Communications Security (CCS'2017)},
pages = {1631--1648},
publisher = {ACM},
year = {2017},
isbn = {978-1-4503-4946-8/17/10},
keywords = {RSA, cryptoimplementations},
}
++
==== 2016====
* **Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ACM Transactions on Mathematicsl Software//, ACM, 2016, 27:1--27:11.\\ Keywords: [[:publications:keywords:randomness|randomness]], [[http://dx.doi.org/10.1145/2988228|DOI website]], ++ BibTeX |@Article{2016-toms-sys,
title = {{Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm}},
author = {Marek Sys and Zdenek Riha and Vashek Matyas},
journal = {ACM Transactions on Mathematicsl Software},
volume = {43},
number = {3},
pages = {27:1--27:11},
publisher = {ACM},
year = {2016},
issn = {0098-3500},
doi = {10.1145/2988228},
keywords = {randomness},
}
++
* **Attack Detection Using Evolutionary Computation**\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:andriy-stetsko|Andriy Stetsko]],\\ //Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges//, Springer series on Studies in Computational Intelligence, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InCollection{2016-ciwsn-stehlik,
title = {Attack Detection Using Evolutionary Computation},
author = {Martin Stehlik and Vashek Matyas and Andriy Stetsko},
booktitle = {Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges},
publisher = {Springer series on Studies in Computational Intelligence},
year = {2016},
keywords = {WSN},
}
++
* **Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping -- Secrecy Amplification Case**\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //International Conference on Cryptology and Network Security (CANS 2016)//, Springer, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2016-cans-ostadal,
title = {Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping -- Secrecy Amplification Case},
author = {Radim Ostadal and Petr Svenda and Vashek Matyas},
booktitle = {International Conference on Cryptology and Network Security (CANS 2016)},
publisher = {Springer},
year = {2016},
keywords = {WSN},
}
++
* **Avalanche Effect in Improperly Initialized CAESAR Candidates**\\ [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016//, Open Publishing Association, 2016, volume 233 of Electronic Proceedings in Theoretical Computer Science, 72-81.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2016-memics-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.4204/EPTCS.233.7|DOI website]], ++ BibTeX |@InProceedings{2016-memics-ukrop,
title = {Avalanche Effect in Improperly Initialized CAESAR Candidates},
author = {Martin Ukrop and Petr Svenda},
booktitle = {Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016},
series = {Electronic Proceedings in Theoretical Computer Science},
volume = {233},
pages = {72-81},
publisher = {Open Publishing Association},
year = {2016},
doi = {10.4204/EPTCS.233.7},
keywords = {eacirc, randomness},
editor = {Bouda, Jan and Holík, Lukáš and Kofroň, Jan and Strejček, Jan and Rambousek, Adam},
eventtitle = {MEMICS},
eventdate = {October 23--25, 2016},
}
++
* **Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:mike-just|Mike Just]],\\ //IFIP International Conference on Information Security Theory and Practice//, 2016, 35--50.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:sodatsw|sodatsw]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1007/978-3-319-45931-8_3|DOI website]], ++ BibTeX |@InProceedings{2016-wistp-stavova,
title = {Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms},
author = {Vlasta Stavova and Vashek Matyas and Mike Just},
booktitle = {IFIP International Conference on Information Security Theory and Practice},
pages = {35--50},
organization = {Springer},
year = {2016},
doi = {10.1007/978-3-319-45931-8_3},
keywords = {usablesec, SODATSW, GAMU},
}
++
* **New results on reduced-round Tiny Encryption Algorithm using genetic programming**\\ [[:publications:authors:karel-kubicek|Karel Kubicek]], [[:publications:authors:jiri-novotny|Jiri Novotny]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //IEEE Infocommunications//, 2016.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2016-infocommunications-kubicek.pdf|pre-print PDF}}, [[http://www.infocommunications.hu/2016_1|paper website]], ++ BibTeX |@Article{2016-infocommunications-kubicek,
title = {New results on reduced-round Tiny Encryption Algorithm using genetic programming},
author = {Karel Kubicek and Jiri Novotny and Petr Svenda and Martin Ukrop},
journal = {IEEE Infocommunications},
volume = {8},
issue = {1},
year = {2016},
url = {http://www.infocommunications.hu/2016_1},
keywords = {eacirc, randomness},
}
++
* **On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:mike-just|Mike Just]],\\ //Euro Usable Security (EuroUSEC) Workshop Programme//, 2016.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:pua|pua]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.14722/eurousec.2016.23003|DOI website]], ++ BibTeX |@InProceedings{2016-eurousec-stavova,
title = {On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications},
author = {Vlasta Stavova and Vashek Matyas and Mike Just},
booktitle = {Euro Usable Security (EuroUSEC) Workshop Programme},
organization = {Internet Society},
year = {2016},
doi = {10.14722/eurousec.2016.23003},
keywords = {usablesec, ESET, PUA, GAMU},
}
++
* **Randomness Testing: Result Interpretation and Speed**\\ [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday//, Springer Berlin Heidelberg, 2016, 389--395.\\ [[http://dx.doi.org/10.1007/978-3-662-49301-4_24|DOI website]], [[https://doi.org/10.1007/978-3-662-49301-4_24|paper website]], ++ BibTeX |@InBook{2016-newcode-sys,
title = {Randomness Testing: Result Interpretation and Speed},
author = {Marek Sys and Vashek Matyas},
booktitle = {The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday},
pages = {389--395},
publisher = {Springer Berlin Heidelberg},
address = {Berlin, Heidelberg},
year = {2016},
isbn = {978-3-662-49301-4},
doi = {10.1007/978-3-662-49301-4_24},
url = {https://doi.org/10.1007/978-3-662-49301-4_24},
editor = {Ryan, Peter Y. A. and Naccache, David and Quisquater, Jean-Jacques},
}
++
* **Reconsidering Attacker Models in Ad-hoc Networks**\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //24th International Workshop on Security Protocols (SPW 2016)//, Springer, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2016-spw-ostadal,
title = {Reconsidering Attacker Models in Ad-hoc Networks},
author = {Radim Ostadal and Petr Svenda and Vashek Matyas},
booktitle = {24th International Workshop on Security Protocols (SPW 2016)},
publisher = {Springer},
year = {2016},
keywords = {WSN},
}
++
* **The Million-Key Question -- Investigating the Origins of RSA Public Keys**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:peter-sekan|Peter Sekan]], [[:publications:authors:rudolf-kvasnovsky|Rudolf Kvasnovsky]], [[:publications:authors:david-formanek|David Formanek]], [[:publications:authors:david-komarek|David Komarek]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //FI MU Report Series, FIMU-RS-2016-03//, Masaryk University, 2016, 1--83.\\ Keywords: [[:publications:keywords:rsa|rsa]], ++ BibTeX |@InProceedings{2016-fimunitr201603-svenda,
title = {The Million-Key Question -- Investigating the Origins of RSA Public Keys},
author = {Petr Svenda and Matus Nemec and Peter Sekan and Rudolf Kvasnovsky and David Formanek and David Komarek and Vashek Matyas},
booktitle = {FI MU Report Series, FIMU-RS-2016-03},
pages = {1--83},
publisher = {Masaryk University},
year = {2016},
keywords = {RSA},
}
++
* **The Million-Key Question -- Investigating the Origins of RSA Public Keys**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:peter-sekan|Peter Sekan]], [[:publications:authors:rudolf-kvasnovsky|Rudolf Kvasnovsky]], [[:publications:authors:david-formanek|David Formanek]], [[:publications:authors:david-komarek|David Komarek]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //The 25th USENIX Security Symposium (UsenixSec'2016)//, USENIX, 2016, 893--910.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2016-usenixsec-svenda.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2016-usenixsec-svenda,
title = {The Million-Key Question -- Investigating the Origins of RSA Public Keys},
author = {Petr Svenda and Matus Nemec and Peter Sekan and Rudolf Kvasnovsky and David Formanek and David Komarek and Vashek Matyas},
booktitle = {The 25th USENIX Security Symposium (UsenixSec'2016)},
pages = {893--910},
publisher = {USENIX},
year = {2016},
isbn = {978-1-931971-32-4},
keywords = {RSA, cryptoimplementations},
}
++
* **Towards better selective forwarding and delay attacks detection in wireless sensor networks**\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:andriy-stetsko|Andriy Stetsko]],\\ //2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)//, 2016, 1-6.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1109/ICNSC.2016.7478978|DOI website]], ++ BibTeX |@InProceedings{2016-icnsc-stehlik,
title = {Towards better selective forwarding and delay attacks detection in wireless sensor networks},
author = {Martin Stehlik and Vashek Matyas and Andriy Stetsko},
booktitle = {2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)},
pages = {1-6},
year = {2016},
doi = {10.1109/ICNSC.2016.7478978},
keywords = {WSN},
}
++
==== 2015====
* **Architecture Considerations for Massively Parallel Hardware Security Platform**\\ [[:publications:authors:dan-cvrcek|Dan Cvrcek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //The 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE--2015), LNCS 9354//, Springer, 2015, 269--288.\\ [[http://dx.doi.org/10.1007/978-3-319-24126-5_16|DOI website]], ++ BibTeX |@InProceedings{2015-space-cvrcek,
title = {Architecture Considerations for Massively Parallel Hardware Security Platform},
author = {Dan Cvrcek and Petr Svenda},
booktitle = {The 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE--2015), LNCS 9354},
pages = {269--288},
publisher = {Springer},
year = {2015},
doi = {10.1007/978-3-319-24126-5_16},
}
++
* **Challenges of fiction in network security -- perspective of virtualized environments**\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:tatevik-baghdasaryan|Tatevik Baghdasaryan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Cambridge International Workshop on Security Protocols//, Springer, 2015.\\ ++ BibTeX |@InProceedings{2015-spw-bukac,
title = {Challenges of fiction in network security -- perspective of virtualized environments},
author = {Vit Bukac and Radim Ostadal and Petr Svenda and Tatevik Baghdasaryan and Vashek Matyas},
booktitle = {Cambridge International Workshop on Security Protocols},
publisher = {Springer},
year = {2015},
}
++
* **DDoSaaS: DDoS jako služba**\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //IS2: From trends to solutions//, Tate International, 2015, 35-39.\\ Keywords: [[:publications:keywords:ddosaas|ddosaas]], ++ BibTeX |@InProceedings{2015-is2-bukac,
title = {DDoSaaS: DDoS jako služba},
author = {Vit Bukac and Vlasta Stavova and Lukas Nemec and Zdenek Riha and Vashek Matyas},
booktitle = {IS2: From trends to solutions},
pages = {35-39},
publisher = {Tate International},
address = {Praha},
location = {Praha},
year = {2015},
isbn = {978-80-86813-28-8},
keywords = {ddosaas},
}
++
* **On Secrecy Amplification Protocols**\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //The 9th WISTP International Conference on Information Security Theory and Practice (WISTP--2015), LNCS 9311//, Springer, 2015, 3--19.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-24018-3 1|DOI website]], ++ BibTeX |@InProceedings{2015-wistp-ostadal,
title = {On Secrecy Amplification Protocols},
author = {Radim Ostadal and Petr Svenda and Vashek Matyas},
booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP--2015), LNCS 9311},
pages = {3--19},
publisher = {Springer},
year = {2015},
doi = {10.1007/978-3-319-24018-3 1},
keywords = {WSN},
}
++
* **Service in Denial – Clouds Going with the Winds**\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 9th International Conference on Network and System Security//, Springer International Publishing, 2015, 130-143.\\ Keywords: [[:publications:keywords:ddosaas|ddosaas]], [[http://dx.doi.org/10.1007/978-3-319-25645-0_9|DOI website]], [[http://dx.doi.org/10.1007/978-3-319-25645-0_9|paper website]], ++ BibTeX |@InBook{2015-nss-bukac,
title = {Service in Denial – Clouds Going with the Winds},
author = {Vit Bukac and Vlasta Stavova and Lukas Nemec and Zdenek Riha and Vashek Matyas},
booktitle = {Proceedings of the 9th International Conference on Network and System Security},
pages = {130-143},
publisher = {Springer International Publishing},
year = {2015},
isbn = {978-3-319-25645-0},
doi = {10.1007/978-3-319-25645-0_9},
url = {http://dx.doi.org/10.1007/978-3-319-25645-0_9},
keywords = {ddosaas},
}
++
* **The challenge of increasing safe response of antivirus software users**\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:kamil-malinka|Kamil Malinka]],\\ //International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science//, 2015, 133--143.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1007/978-3-319-29817-7_12|DOI website]], ++ BibTeX |@InProceedings{2015-memics-stavova,
title = {The challenge of increasing safe response of antivirus software users},
author = {Vlasta Stavova and Vashek Matyas and Kamil Malinka},
booktitle = {International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science},
pages = {133--143},
organization = {Springer},
year = {2015},
doi = {10.1007/978-3-319-29817-7_12},
keywords = {usablesec, ESET, GAMU},
}
++
* **WSNProtectLayer: Security Middleware for Wireless Sensor Networks**\\ [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:filip-jurnecka|Filip Jurnecka]] and [[:publications:authors:martin-stehlik|Martin Stehlik]],\\ //Securing Cyber-Physical Systems//, CRC Press, 2015, 119-162.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1201/b19311-6|DOI website]], ++ BibTeX |@InCollection{2015-scps-matyas,
title = {{WSNProtectLayer: Security Middleware for Wireless Sensor Networks}},
author = {Vashek Matyas and Petr Svenda and Andriy Stetsko and Dusan Klinec and Filip Jurnecka and Martin Stehlik},
booktitle = {Securing Cyber-Physical Systems},
pages = {119-162},
publisher = {CRC Press},
year = {2015},
isbn = {978-1-4987-0098-6},
doi = {10.1201/b19311-6},
keywords = {WSN},
}
++
==== 2014====
* **A New Approach to SA in Partially Compromised Networks**\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security, Privacy, and Applied Cryptography Engineering -- 4th Int. Conf., SPACE 2014, LNCS 8804//, Springer, 2014.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2014-space-ostadal,
title = {A New Approach to SA in Partially Compromised Networks},
author = {Radim Ostadal and Petr Svenda and Vashek Matyas},
booktitle = {Security, Privacy, and Applied Cryptography Engineering -- 4th Int. Conf., SPACE 2014, LNCS 8804},
publisher = {Springer},
year = {2014},
keywords = {WSN},
}
++
* **Constructing empirical tests of randomness**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //2014 11th International Conference on Security and Cryptography (SECRYPT)//, 2014, 1--9.\\ {{:publications:pdf:2014-secrypt-sys.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2014-secrypt-sys,
title = {Constructing empirical tests of randomness},
author = {Marek Sys and Petr Svenda and Martin Ukrop and Vashek Matyas},
booktitle = {2014 11th International Conference on Security and Cryptography (SECRYPT)},
pages = {1--9},
organization = {IEEE},
year = {2014},
}
++
* **Constructing empirical tests of randomness**\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 11th International Conference on Security and Cryptography//, 2014.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2014-secrypt-sys.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0005023902290237|DOI website]], ++ BibTeX |@InProceedings{2014-secrypt-sys,
title = {Constructing empirical tests of randomness},
author = {Marek Sys and Petr Svenda and Martin Ukrop and Vashek Matyas},
booktitle = {Proceedings of the 11th International Conference on Security and Cryptography},
year = {2014},
doi = {10.5220/0005023902290237},
keywords = {eacirc, randomness},
eventtitle = {ICETE},
}
++
* **Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //E-Business and Telecommunications//, Springer Berlin Heidelberg, 2014, 290--305.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2014-ccis-svenda.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-662-44788-8_17|DOI website]], ++ BibTeX |@InCollection{2014-ccis-svenda,
title = {Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits},
author = {Petr Svenda and Martin Ukrop and Vashek Matyas},
booktitle = {E-Business and Telecommunications},
volume = {456},
pages = {290--305},
publisher = {Springer Berlin Heidelberg},
year = {2014},
doi = {10.1007/978-3-662-44788-8_17},
keywords = {eacirc, randomness},
}
++
* **Evaluation of key management schemes in wireless sensor networks**\\ [[:publications:authors:filip-jurnecka|Filip Jurnecka]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security and Trust Management//, Springer International Publishing, 2014, 198-203.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-11851-2_16|DOI website]], [[http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16|paper website]], ++ BibTeX |@InProceedings{2014-stm-jurnecka,
title = {Evaluation of key management schemes in wireless sensor networks},
author = {Filip Jurnecka and Martin Stehlik and Vashek Matyas},
booktitle = {Security and Trust Management},
pages = {198-203},
publisher = {Springer International Publishing},
address = {Switzerland},
year = {2014},
isbn = {978-3-319-11850-5},
doi = {10.1007/978-3-319-11851-2_16},
url = {http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16},
keywords = {WSN},
}
++
* **Faster Randomness Testing with the NIST Statistical Test Suite**\\ [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:zdenek-riha|Zdenek Riha]],\\ //International Conference on Security, Privacy, and Applied Cryptography Engineering//, 2014, 272--284.\\ ++ BibTeX |@InProceedings{2014-space-sys,
title = {Faster Randomness Testing with the NIST Statistical Test Suite},
author = {Marek Sys and Zdenek Riha},
booktitle = {International Conference on Security, Privacy, and Applied Cryptography Engineering},
pages = {272--284},
organization = {Springer},
year = {2014},
}
++
* **Improving Intrusion Detection Systems for Wireless Sensor Networks**\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:tobias-smolka|Tobias Smolka]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:martin-stehlik|Martin Stehlik]],\\ //Applied Cryptography and Network Security//, Springer International Publishing, 2014, volume 8479 of Lecture Notes in Computer Science, 343-360.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-07536-5_21|DOI website]], ++ BibTeX |@InCollection{2014-ssms-stetsko,
title = {Improving Intrusion Detection Systems for Wireless Sensor Networks},
author = {Andriy Stetsko and Tobias Smolka and Vashek Matyas and Martin Stehlik},
booktitle = {Applied Cryptography and Network Security},
series = {Lecture Notes in Computer Science},
volume = {8479},
pages = {343-360},
publisher = {Springer International Publishing},
year = {2014},
isbn = {978-3-319-07535-8},
doi = {10.1007/978-3-319-07536-5_21},
keywords = {WSN},
}
++
* **On Node Capturing Attacker Strategies**\\ [[:publications:authors:filip-jurnecka|Filip Jurnecka]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers//, Springer LNCS, 2014, 300-315.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-12400-1_29|DOI website]], ++ BibTeX |@InProceedings{2014-spw-jurnecka,
title = {On Node Capturing Attacker Strategies},
author = {Filip Jurnecka and Martin Stehlik and Vashek Matyas},
booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers},
pages = {300-315},
publisher = {Springer LNCS},
year = {2014},
doi = {10.1007/978-3-319-12400-1_29},
keywords = {WSN},
}
++
==== 2013====
* **Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks**\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:adam-saleh|Adam Saleh]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems//, MIT Press, 2013, 569-576.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://mitpress.mit.edu/sites/default/files/titles/content/ecal13/ch082.html|paper website]], ++ BibTeX |@InProceedings{2013-sssm-stehlik,
title = {Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks},
author = {Martin Stehlik and Adam Saleh and Andriy Stetsko and Vashek Matyas},
booktitle = {Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems},
pages = {569-576},
publisher = {MIT Press},
address = {Cambridge, MA 02142-1493 USA},
year = {2013},
isbn = {978-0-262-31709-2},
url = {http://mitpress.mit.edu/sites/default/files/titles/content/ecal13/ch082.html},
keywords = {WSN},
}
++
* **On the origin of yet another channel**\\ [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ Springer, 2013.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], {{:publications:pdf:2013-spw-svenda.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2013-spw-svenda,
title = {On the origin of yet another channel},
author = {Petr Svenda and Vashek Matyas},
organization = {Faculty of Informatics Masaryk University},
publisher = {Springer},
year = {2013},
keywords = {eacirc},
eventtitle = {Twenty-first International Workshop on Security Protocols},
eventdate = {2013-03-19},
}
++
* **Towards cryptographic function distinguishers with evolutionary circuits**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 10th International Conference on Security and Cryptography//, 2013, 135--146.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2013-secrypt-svenda.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0004524001350146|DOI website]], ++ BibTeX |@InProceedings{2013-secrypt-svenda,
title = {Towards cryptographic function distinguishers with evolutionary circuits},
author = {Petr Svenda and Martin Ukrop and Vashek Matyas},
booktitle = {Proceedings of the 10th International Conference on Security and Cryptography},
pages = {135--146},
year = {2013},
doi = {10.5220/0004524001350146},
keywords = {eacirc, randomness},
eventtitle = {ICETE},
}
++
==== 2012====
* **Evolutionary Design of Message Efficient Secrecy Amplification Protocols**\\ [[:publications:authors:tobias-smolka|Tobias Smolka]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Genetic Programming//, Berlin: Springer Verlag, 2012, 194--205.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2012-gp-smolka,
title = {Evolutionary Design of Message Efficient Secrecy Amplification Protocols},
author = {Tobias Smolka and Petr Svenda and Lukas Sekanina and Vashek Matyas},
booktitle = {Genetic Programming},
pages = {194--205},
publisher = {Berlin: Springer Verlag},
year = {2012},
keywords = {WSN},
}
++
* **Two improvements of random key predistribution for wireless sensor networks**\\ [[:publications:authors:jiri-kur|Jiri Kur]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //International Conference on Security and Privacy in Communication Systems//, 2012, 61--75.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2014-securecomm-kur,
title = {Two improvements of random key predistribution for wireless sensor networks},
author = {Jiri Kur and Vashek Matyas and Petr Svenda},
booktitle = {International Conference on Security and Privacy in Communication Systems},
pages = {61--75},
organization = {Springer},
year = {2012},
keywords = {WSN},
}
++
==== 2011====
* **Attack detection vs. privacy--How to find the link or how to hide it?**\\ [[:publications:authors:jiri-kur|Jiri Kur]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //International Workshop on Security Protocols//, 2011, 189--199.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2011-spw-kur,
title = {Attack detection vs. privacy--How to find the link or how to hide it?},
author = {Jiri Kur and Vashek Matyas and Andriy Stetsko and Petr Svenda},
booktitle = {International Workshop on Security Protocols},
pages = {189--199},
organization = {Springer},
year = {2011},
keywords = {WSN},
}
++
* **Calibrating and Comparing Simulators for Wireless Sensor Networks**\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 8\superscriptth IEEE International Conference on Mobile Adhoc and Sensor Systems//, IEEE Computer Society, 2011, 733-738.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2011-ssm-stetsko,
title = {Calibrating and Comparing Simulators for Wireless Sensor Networks},
author = {Andriy Stetsko and Martin Stehlik and Vashek Matyas},
booktitle = {Proceedings of the 8\superscript{th} IEEE International Conference on Mobile Adhoc and Sensor Systems},
series = {MASS '11},
pages = {733-738},
publisher = {{IEEE} Computer Society},
address = {Los Alamitos, CA, USA},
year = {2011},
isbn = {978-0-7695-4469-4},
keywords = {WSN},
}
++
==== 2009====
* **Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks**\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //EC2ND 2009 -- European Conference on Computer Network Defense//, IEEE Computer Society, 2009, 21-28.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2009-ec2nd-stetsko,
title = {Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks},
author = {Andriy Stetsko and Vashek Matyas},
booktitle = {EC2ND 2009 -- European Conference on Computer Network Defense},
pages = {21-28},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
year = {2009},
isbn = {978-0-7695-3983-6},
keywords = {WSN},
}
++
* **Evolutionary design of secrecy amplification protocols for wireless sensor networks**\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the second ACM Conference on Wireless Network Security//, 2009, 225--236.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |@InProceedings{2009-cwsn-svenda,
title = {Evolutionary design of secrecy amplification protocols for wireless sensor networks},
author = {Petr Svenda and Lukas Sekanina and Vashek Matyas},
booktitle = {Proceedings of the second {ACM} Conference on Wireless Network Security},
pages = {225--236},
year = {2009},
keywords = {WSN},
}
++