Courses I teach
Low-level programming in C (PB071)
Security technologies (PV204)
Secure coding (PA193)
Secure network design (PA197)
PhD seminar on ITSec (PA168)
My coding and other projects
JCAlgTest (#smartcards, JavaCard performance testing)
Myst (#smartcards, Secure multi-party on JavaCards)
JCMathLib (#smartcards, ECPoint&Bignat open library)
RSA key classifier (#crypto, Pubkey to library classificator)
JCProfiler (#smartcards, JavaCard Applet speed profile)
WSNProtectLayer (#wsn/IoT, Transparent enc&auth proxy)
EACirc (#randomness, Randomness testing battery)
APDUPlay (#smartcards, APDU logging and manipulation)
JavaPresso (#smartcards, Source code packer for JavaCard)
My astrophotography pictures (#astro)
“I want to empower people running secure multiparty protocols on cryptographic smartcards.”
See full list of my publications. Read about research topics in CRoCS lab here. My older homepage is still available.
I have a strong passion for cryptographic smartcards, both for the research and development topics. We recently analyzed millions RSA keys extracted from smartcards to detect biases in generated public keys (USENIXSec'16, best paper award). Our follow-up lead to discovery of the weak RSA key generation algorithm on Infineon smartcards known as ROCA vulnerability (CVE-2017-15361) received The Real-World Impact award at ACM CCS 2017. The more precise method to measure the popularity of cryptographic libraries detects the significant variation in a source of certificates submitted weekly to Certificate Transparency and shows that OpenSSL is more popular than ever in internet-wide scans (ACSAC 2017).
The compromise-resistant ECC-based signing and key generation via secure multiparty computation protocol on a grid of smartcards was showcased at DEFCON 2017 with all details published at ACM CCS 2017. I co-developed library for Bignat and ECPoint for JavaCard platform which requires no vendor proprietary API JCMathLib showcased at BlackHat 2017 and used in ACM CCS 2017 prototype. In 2006 I started and still maintain the largest open-source database of performance and algorithmic support tests of smartcards with JavaCard platform (JCAlgTest project). I was involved in the laboratory testing of the resilience of smartcards hardware against power and fault analysis, reverse engineering of JavaCard bytecode from the power trace (paper), security code review of JavaCard applets and applications development. I worked on data retention compliant logging for AN.ON anonymity service at TU Dresden (paper) and massively parallel cloud security hardware platform (paper).
We work on non-tradition randomness testing battery based on genetic programming (EACirc project) with statistical tests continually adapted to analyzed binary sequence to find defects in cryptographic functions (paper). We also aim to provide guidance which part of an analyzed function is responsible for the observed defect. We proposed lightweight yet powerful bias detection method based on boolean functions (Secrypt 2017) with detection of previously unknown biases in Java Random and C rand generators. I was involved in practical entropy extractors from hardware sources available on mobile devices, especially from the microphone and camera input (paper, paper).
WSNs were my main Ph.D. research topic with thesis defended in 2009 (The link key security in wireless sensor networks, thesis). We inspect security protocols for networks with the assumption of an inevitability of partial compromise. We proposed several techniques how to maintain reasonably functional and secure network ranging from the node capture resilient key establishment (paper) over key strengthening mechanism called secrecy amplification (paper) to automatic protocol generation (paper). We developed transparent security platform via virtualized radio stack for TinyOS (WSNProtectLayer project).
I teach mostly security and applied cryptography focused courses (see list on the left), commonly with programming as the important component for deeper understanding. I really value feedback and participation - don't leave for yourself what you are happy and unhappy with.
I do supervise bc. and mgr. thesis - read first the list of available topics here and projects we work on. Then ask for a personal meeting - the majority of the thesis I supervise are customized based on a discussion with you. And don't be shy to approach me with your own favorite topic.
@InProceedings{2024-ifipsec-janovsky, title = {Chain of Trust: Unraveling References Among Common Criteria Certified Products}, author = {Adam Janovsky and Lukasz Chmielewski and Petr Svenda and Jan Jancar and Vashek Matyas}, booktitle = {IFIP International Conference on ICT Systems Security and Privacy Protection}, pages = {}, publisher = {Springer Nature Switzerland}, address = {Cham}, year = {2024}, isbn = {978-3-031-65175-5}, doi = {10.1007/978-3-031-65175-5_14}, url = {https://www.sciencedirect.com/science/article/pii/S0167404824001974}, keywords = {sec-certs}, edition = {volume 710}, editor = {Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis}, }
@InProceedings{2024-ches-tpmscan, title = {TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips}, author = {Petr Svenda and Antonin Dufka and Milan Broz and Roman Lacko and Tomas Jaros and Daniel Zatovic and Josef Pospisil}, booktitle = {IACR Transactions on Cryptographic Hardware and Embedded Systems}, volume = {2024, No. 2}, pages = {714–734}, publisher = {IACR}, year = {2024}, issn = {ISSN 2569-2925}, doi = {10.46586/tches.v2024.i2.714-734}, url = {https://tches.iacr.org/index.php/TCHES/article/view/11444}, keywords = {tpm, rsa, ecc, CC, fips140, sidechannel}, }
@InProceedings{2024-caise-bakhtina, title = {The Power of Many: Securing Organisational Identity Through Distributed Key Management}, author = {Mariia Bakhtina and Jan Kvapil and Petr Svenda and Matulevicius Raimundas}, booktitle = {Advanced Information Systems Engineering}, pages = {475--491}, publisher = {Springer Nature Switzerland}, location = {Cham}, isbn = {978-3-031-61057-8}, doi = {10.1007/978-3-031-61057-8_28}, keywords = {distributed control, key management, organisational digital identity, security, threshold signatures, zero trust}, shorttitle = {The Power of Many}, abstract = {Organisational Digital Identity ({ODI}) often relies on the credentials and keys being controlled by a single person-representative. Moreover, some Information Systems ({IS}) outsource the key management to a third-party controller. Both the centralisation and outsourcing of the keys threaten data integrity within the {IS}, allegedly provided by a trusted organisation. Also, outsourcing the control prevents an organisation from cryptographically enforcing custom policies, e.g. time-based, regarding the data originating from it. To address this, we propose a Distributed Key Management System ({DKMS}) that eliminates the risks associated with centralised control over an organisation’s identity and allows organisation-enforceable policies. The {DKMS} employs threshold signatures to directly involve multiple organisation’s representatives (e.g. employees, {IS} components, and external custodians) in data signing on its behalf. The threshold signature creation and, therefore, the custom signing policy inclusion, is fully backwards compatible with commonly used signing schemes, such as {RSA} or {ECDSA}. The feasibility of the proposed system is shown in an example data exchange system, X-Road. The implementation confirms the ability of the design to achieve distributed control over the {ODI} during the operational key phase. Excluding a network delay, the implementation introduces less than 200 ms overhead compared to the built-in signing solution.}, editor = {Guizzardi, Giancarlo and Santoro, Flavia and Mouratidis, Haralambos and Soffer, Pnina}, date = {2024}, langid = {english}, }
@InProceedings{2024-trustbus-dufka, title = {Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation}, author = {Antonin Dufka and Jakub Janku and Petr Svenda}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security}, publisher = {Association for Computing Machinery}, year = {2024}, isbn = {9798400717185}, doi = {10.1145/3664476.3670889}, url = {https://doi.org/10.1145/3664476.3670889}, keywords = {smartcards, SMPC, cryptocurrencies, javacard, e-cash}, }
@InProceedings{2024-ches-jancar, title = {pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis}, author = {Jan Jancar and Vojtech Suchanek and Petr Svenda and Vladimir Sedlacek and Lukasz Chmielewski}, booktitle = {IACR Transactions on Cryptographic Hardware and Embedded Systems}, publisher = {Ruhr-University of Bochum}, year = {2024}, keywords = {side-channel,ecc}, doi = {10.46586/tches.v2024.i4.355-381}, url = {https://tches.iacr.org/index.php/TCHES/article/view/11796}, pages = {355–381}, }
@Article{2023-seccerts-janovsky, title = {sec-certs: Examining the security certification practice for better vulnerability mitigation}, author = {Adam Janovsky and Jan Jancar and Petr Svenda and Lukasz Chmielewski and Jiri Michalik and Vashek Matyas}, journal = {Computers & Security}, volume = {143}, year = {2024}, issn = {0167-4048}, doi = {10.1016/j.cose.2024.103895}, url = {https://www.sciencedirect.com/science/article/pii/S0167404824001974}, keywords = {sec-certs}, }
@InProceedings{2023-ares-dufka, title = {Enabling Efficient Threshold Signature Computation via Java Card API}, author = {Antonin Dufka and Petr Svenda}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security}, pages = {11-20}, publisher = {Association for Computing Machinery}, year = {2023}, isbn = {9798400707728}, doi = {10.1145/3600160.3600180}, keywords = {smartcards, SMPC, cryptocurrencies, javacard}, }
@InProceedings{2023-cardis-javacard, title = {The adoption rate of JavaCard features by certified products and open-source projects }, author = {Lukas Zaoral and Antonin Dufka and Petr Svenda}, booktitle = {Proceedings of the 22nd Smart Card Research and Advanced Application Conference, Lecture Notes in Computer Science, vol 14530}, pages = {169--189}, publisher = {Springer}, year = {2023}, isbn = {978-3-031-54409-5}, doi = {10.1007/978-3-031-54409-5_9}, keywords = {Cryptographic Hardware, javacard, common criteria, fips140, smartcards}, language = {eng}, }
@InProceedings{2022-jcalgtest-svenda, title = {JCAlgTest: Robust identification metadata for certified smartcards}, author = {Petr Svenda and Rudolf Kvasnovsky and Imrich Nagy and Antonin Dufka}, booktitle = {19th International Conference on Security and Cryptography}, pages = {597--604}, publisher = {INSTICC}, address = {Lisabon}, location = {Lisabon}, year = {2022}, isbn = {978-989-758-590-6}, doi = {10.5220/0000163500003283}, keywords = {smartcards, javacard}, language = {eng}, }
@InProceedings{2022-securitymargins-secrypt, title = {Large-scale randomness study of security margins for 100+ cryptographic functions}, author = {Dusan Klinec and Marek Sys and Karel Kubicek and Petr Svenda and Vashek Matyas}, pages = {134--146}, publisher = {INSTICC}, location = {Lisabon}, year = {2022}, isbn = {978-989-758-590-6}, doi = {10.5220/0000163500003283}, conference = {19th International Conference on Security and Cryptography (SECRYPT 2022)}, language = {eng}, }
@InProceedings{2022-secrypt-shine, title = {SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes}, author = {Antonin Dufka and Vladimir Sedlacek and Petr Svenda}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography}, pages = {305-316}, publisher = {SCITEPRESS}, year = {2022}, isbn = {978-989-758-590-6}, issn = {2184-7711}, doi = {10.5220/0011145600003283}, keywords = {smartcards, SMPC, cryptocurrencies}, }
@InProceedings{2020-esorics-privrsabias, title = {Biased RSA private keys: Origin attribution of GCD-factorable keys}, author = {Adam Janovsky and Matus Nemec and Petr Svenda and Peter Sekan and Vashek Matyas}, booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020}, publisher = {Springer}, year = {2020}, keywords = {RSA, bias, classification, smartcard, cryptoimplementations}, }
@InProceedings{2020-esorics-foolingprimes, title = {Fooling primality tests on smartcards}, author = {Vladimir Sedlacek and Jan Jancar and Petr Svenda}, booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020}, publisher = {Springer}, year = {2020}, doi = {10.1007/978-3-030-59013-0\_11}, keywords = {ECC, primality, pseudoprimes, smartcards, cryptoimplementations}, }
@Article{2020-jcmathlib-cybercert, title = {JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets}, author = {Vasilios Mavroudis and Petr Svenda}, volume = {61}, number = {2}, pages = {64--71}, publisher = {IEEE}, year = {2020}, doi = {10.1109/EuroSPW51379.2020.00022}, keywords = {ECC, smartcards, opentools, smpc}, conference = {First International Workshop on Lightweight and Incremental Cybersecurity Certification}, }
@InProceedings{2020-tches-minerva, title = {Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces}, author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys}, booktitle = {Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020}, publisher = {Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems}, year = {2020}, issn = {2569-2925}, doi = {10.13154/tches.v2020.i4.281-308}, keywords = {ECC, smartcards, libraries, leakage, side-channel, cryptoimplementations}, }
@InProceedings{2019-secrypt2017selected-sys, title = {BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256}, author = {Marek Sys and Dusan Klinec and Karel Kubicek and Petr Svenda}, booktitle = {E-Business and Telecommunications}, pages = {123--149}, publisher = {Springer International Publishing}, address = {Cham}, year = {2019}, isbn = {978-3-030-11039-0}, keywords = {randomness, hypothesis, boolean}, editor = {Obaidat, Mohammad S. and Cabello, Enrique}, }
@InProceedings{2019-ieeevsli-mrazek, title = {Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques}, author = {Vojtech Mrazek and Marek Sys and Petr Svenda}, booktitle = {IEEE Transactions on Very Large Scale Integration (VLSI) Systems}, publisher = {IEEE}, year = {2019}, issn = {1557-9999}, doi = {10.1109/TVLSI.2019.2923848}, keywords = {FPGA, genetic-algorithms, randomness, distinguishers}, }
@Article{2019-sensors-nemec, title = {Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks}, author = {Lukas Nemec and Vashek Matyas and Radim Ostadal and Petr Svenda and Pierre-Louis Palant}, journal = {Sensors}, volume = {19}, number = {4}, publisher = {Multidisciplinary Digital Publishing Institute}, year = {2019}, issn = {1424-8220}, doi = {10.3390/s19040914}, url = {http://www.mdpi.com/1424-8220/19/4/914}, keywords = {WSN}, }
@Conference{2019-secrypt-sedlacek, title = {I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability}, author = {Vladimir Sedlacek and Dusan Klinec and Marek Sys and Petr Svenda and Vashek Matyas}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT}, pages = {25-36}, organization = {INSTICC}, publisher = {SciTePress}, year = {2019}, isbn = {978-989-758-378-0}, doi = {10.5220/0007786600250036}, keywords = {ECC, factorization, smartcards, cryptoimplementations}, }
@InProceedings{2018-dcoss-nemec, title = {Adaptive Secrecy Amplification with Radio Channel Key Extraction}, author = {Lukas Nemec and Radim Ostadal and Vashek Matyas and Petr Svenda}, booktitle = {2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS)}, pages = {123-130}, year = {2018}, issn = {2325-2944}, doi = {10.1109/DCOSS.2018.00028}, keywords = {WSN}, }
@InProceedings{2018-spw-nemec, title = {Entropy Crowdsourcing -- Protocols for Link Key Updates in Wireless Sensor Networks}, author = {Lukas Nemec and Radim Ostadal and Vashek Matyas and Petr Svenda}, booktitle = {Security Protocols Workshop XXVI}, pages = {84-92}, publisher = {Springer International Publishing}, year = {2018}, isbn = {978-3-030-03251-7}, keywords = {WSN}, }
@InProceedings{2017-ccs-mavroudis, title = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components}, author = {Vasilios Mavroudis and Andrea Cerulli and Petr Svenda and Dan Cvrcek and Dusan Klinec and George Danezis}, booktitle = {24th ACM Conference on Computer and Communications Security (CCS'2017)}, pages = {1583--1600}, publisher = {ACM}, year = {2017}, isbn = {978-1-4503-4946-8/17/10}, keywords = {smartcards, SMPC}, }
@InProceedings{2017-acsac-nemec, title = {Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans}, author = {Matus Nemec and Dusan Klinec and Petr Svenda and Peter Sekan and Vashek Matyas}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)}, publisher = {ACM}, year = {2017}, doi = {10.1145/3134600.3134612}, keywords = {cryptolibs, RSA, fingerprinting, smartcard, cryptoimplementations}, }
@InProceedings{2017-secrypt-sys, title = {The Efficient Randomness Testing using Boolean Functions}, author = {Marek Sys and Dusan Klinec and Petr Svenda}, booktitle = {The 14th International Conference on Security and Cryptography (Secrypt'2017)}, pages = {92--103}, publisher = {SCITEPRESS}, year = {2017}, isbn = {978-989-758-259-2}, keywords = {eacirc, randomness}, }
@InProceedings{2017-ccs-nemec, title = {The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli}, author = {Matus Nemec and Marek Sys and Petr Svenda and Dusan Klinec and Vashek Matyas}, booktitle = {24th ACM Conference on Computer and Communications Security (CCS'2017)}, pages = {1631--1648}, publisher = {ACM}, year = {2017}, isbn = {978-1-4503-4946-8/17/10}, keywords = {RSA, cryptoimplementations}, }
@InProceedings{2016-cans-ostadal, title = {Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping -- Secrecy Amplification Case}, author = {Radim Ostadal and Petr Svenda and Vashek Matyas}, booktitle = {International Conference on Cryptology and Network Security (CANS 2016)}, publisher = {Springer}, year = {2016}, keywords = {WSN}, }
@InProceedings{2016-memics-ukrop, title = {Avalanche Effect in Improperly Initialized CAESAR Candidates}, author = {Martin Ukrop and Petr Svenda}, booktitle = {Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016}, series = {Electronic Proceedings in Theoretical Computer Science}, volume = {233}, pages = {72-81}, publisher = {Open Publishing Association}, year = {2016}, doi = {10.4204/EPTCS.233.7}, keywords = {eacirc, randomness}, editor = {Bouda, Jan and Holík, Lukáš and Kofroň, Jan and Strejček, Jan and Rambousek, Adam}, eventtitle = {MEMICS}, eventdate = {October 23--25, 2016}, }
@Article{2016-infocommunications-kubicek, title = {New results on reduced-round Tiny Encryption Algorithm using genetic programming}, author = {Karel Kubicek and Jiri Novotny and Petr Svenda and Martin Ukrop}, journal = {IEEE Infocommunications}, volume = {8}, issue = {1}, year = {2016}, url = {http://www.infocommunications.hu/2016_1}, keywords = {eacirc, randomness}, }
@InProceedings{2016-spw-ostadal, title = {Reconsidering Attacker Models in Ad-hoc Networks}, author = {Radim Ostadal and Petr Svenda and Vashek Matyas}, booktitle = {24th International Workshop on Security Protocols (SPW 2016)}, publisher = {Springer}, year = {2016}, keywords = {WSN}, }
@InProceedings{2016-fimunitr201603-svenda, title = {The Million-Key Question -- Investigating the Origins of RSA Public Keys}, author = {Petr Svenda and Matus Nemec and Peter Sekan and Rudolf Kvasnovsky and David Formanek and David Komarek and Vashek Matyas}, booktitle = {FI MU Report Series, FIMU-RS-2016-03}, pages = {1--83}, publisher = {Masaryk University}, year = {2016}, keywords = {RSA}, }
@InProceedings{2016-usenixsec-svenda, title = {The Million-Key Question -- Investigating the Origins of RSA Public Keys}, author = {Petr Svenda and Matus Nemec and Peter Sekan and Rudolf Kvasnovsky and David Formanek and David Komarek and Vashek Matyas}, booktitle = {The 25th USENIX Security Symposium (UsenixSec'2016)}, pages = {893--910}, publisher = {USENIX}, year = {2016}, isbn = {978-1-931971-32-4}, keywords = {RSA, cryptoimplementations}, }
@InProceedings{2015-space-cvrcek, title = {Architecture Considerations for Massively Parallel Hardware Security Platform}, author = {Dan Cvrcek and Petr Svenda}, booktitle = {The 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE--2015), LNCS 9354}, pages = {269--288}, publisher = {Springer}, year = {2015}, doi = {10.1007/978-3-319-24126-5_16}, }
@InProceedings{2015-spw-bukac, title = {Challenges of fiction in network security -- perspective of virtualized environments}, author = {Vit Bukac and Radim Ostadal and Petr Svenda and Tatevik Baghdasaryan and Vashek Matyas}, booktitle = {Cambridge International Workshop on Security Protocols}, publisher = {Springer}, year = {2015}, }
@InProceedings{2015-wistp-ostadal, title = {On Secrecy Amplification Protocols}, author = {Radim Ostadal and Petr Svenda and Vashek Matyas}, booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP--2015), LNCS 9311}, pages = {3--19}, publisher = {Springer}, year = {2015}, doi = {10.1007/978-3-319-24018-3 1}, keywords = {WSN}, }
@InCollection{2015-scps-matyas, title = {{WSNProtectLayer: Security Middleware for Wireless Sensor Networks}}, author = {Vashek Matyas and Petr Svenda and Andriy Stetsko and Dusan Klinec and Filip Jurnecka and Martin Stehlik}, booktitle = {Securing Cyber-Physical Systems}, pages = {119-162}, publisher = {CRC Press}, year = {2015}, isbn = {978-1-4987-0098-6}, doi = {10.1201/b19311-6}, keywords = {WSN}, }
@InProceedings{2014-space-ostadal, title = {A New Approach to SA in Partially Compromised Networks}, author = {Radim Ostadal and Petr Svenda and Vashek Matyas}, booktitle = {Security, Privacy, and Applied Cryptography Engineering -- 4th Int. Conf., SPACE 2014, LNCS 8804}, publisher = {Springer}, year = {2014}, keywords = {WSN}, }
@InProceedings{2014-secrypt-sys, title = {Constructing empirical tests of randomness}, author = {Marek Sys and Petr Svenda and Martin Ukrop and Vashek Matyas}, booktitle = {2014 11th International Conference on Security and Cryptography (SECRYPT)}, pages = {1--9}, organization = {IEEE}, year = {2014}, }
@InProceedings{2014-secrypt-sys, title = {Constructing empirical tests of randomness}, author = {Marek Sys and Petr Svenda and Martin Ukrop and Vashek Matyas}, booktitle = {Proceedings of the 11th International Conference on Security and Cryptography}, year = {2014}, doi = {10.5220/0005023902290237}, keywords = {eacirc, randomness}, eventtitle = {ICETE}, }
@InCollection{2014-ccis-svenda, title = {Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits}, author = {Petr Svenda and Martin Ukrop and Vashek Matyas}, booktitle = {E-Business and Telecommunications}, volume = {456}, pages = {290--305}, publisher = {Springer Berlin Heidelberg}, year = {2014}, doi = {10.1007/978-3-662-44788-8_17}, keywords = {eacirc, randomness}, }
@InProceedings{2013-spw-svenda, title = {On the origin of yet another channel}, author = {Petr Svenda and Vashek Matyas}, organization = {Faculty of Informatics Masaryk University}, publisher = {Springer}, year = {2013}, keywords = {eacirc}, eventtitle = {Twenty-first International Workshop on Security Protocols}, eventdate = {2013-03-19}, }
@InProceedings{2013-secrypt-svenda, title = {Towards cryptographic function distinguishers with evolutionary circuits}, author = {Petr Svenda and Martin Ukrop and Vashek Matyas}, booktitle = {Proceedings of the 10th International Conference on Security and Cryptography}, pages = {135--146}, year = {2013}, doi = {10.5220/0004524001350146}, keywords = {eacirc, randomness}, eventtitle = {ICETE}, }
See full list of my publications.