Sitemap This is a sitemap over all available pages ordered by namespaces. internal openlab partners people playground private public blog crocs openlab papers User Testing of Mobile Banking Authentication Methods: UX Testing, User Interviews, and Quantitative Survey Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans [ACSAC 2017] Will You Trust This TLS Certificate? Perceptions of People Working in IT [ACSAC 2019] Bitcoin Singlesig, Hardware wallet, Multisig and CoinJoin tutorial A large-scale comparative study of beta testers and standard users [CACM 2018] Even if users do not read security directives, their behavior is not so catastrophic [CACM 2022] Attackers in Wireless Sensor Networks Will Be Neither Random nor Jumping - Secrecy Amplification Case (CANS 2016) The adoption rate of JavaCard features by certified products and open-source projects [CARDIS 2023] JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets [CyberCert 2020] Adaptive Secrecy Amplification With Radio Channel Key Extraction [DCOSS 2018] Will You Trust This TLS Certificate? Perceptions of People Working in IT (extended version) [ACM DTRAP 2020] Multisig and CoinJoin tutorial [Europen 2022] On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications - EuroUSEC2016 Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors [EuroUSEC 2022] A formula for disaster: a unified approach to elliptic curve special-point-based attacks [ASIACRYPT 2021] Towards Better Selective Forwarding and Delay Attacks Detection in Wireless Sensor Networks - ICNSC 2016 How Do Users Chain Email Accounts Together? [IFIP SEC 2021] Usability Insights from Establishing TLS Connections [IFIP SEC 2022] New results on reduced-round Tiny Encryption Algorithm using genetic programming Crowdsourced Security Reconstitution Teaching Lab: Training Novice Computer Science Teachers (poster) [ACM ITiCSE 2020] Challenges Faced by Teaching Assistants in Computer Science Education Across Europe [ACM ITiCSE 2021] JCAlgTest: Robust identification metadata for certified smartcards [SECRYPT 2022] Enabling Efficient Threshold Signature Computation via Java Card API [ARES 2023] Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation [TRUSTBus 2024] Publications Avalanche effect in improperly initialized CAESAR candidates [MEMICS 2016] Minerva: The curse of ECDSA nonces [TCHES 2020] New results on reduced-round Tiny Encryption Algorithm using genetic programming Privacy-friendly Monero transaction signing on a hardware wallet [IFIPSEC 2020] A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [ACM CCS 2017] Fooling primality tests on smartcards [ESORICS 2020] Biased RSA private keys: Origin attribution of GCD-factorable keys [ESORICS 2020] pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis [CHES 2024] Why Johnny the Developer Can't Work with Public Key Certificates [RSA-CT 2018] Bias in RSA keypair detection, vulnerabilities, classification ROCA: Vulnerable RSA generation (CVE-2017-15361) Large-scale randomness study of security margins for 100+ cryptographic functions [SECRYPT 2022] The Efficient Randomness Testing using Boolean Functions [SeCrypt 2017] BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 [Selected paper from SeCrypt 2017] I want to break square-free: The 4p-1 factorization method and its RSA backdoor viability [SeCrypt 2019] SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signatures [SECRYPT 2022] Reflective Diary for Professional Development of Novice Teachers [ACM SIGCSE 2019] The Stack: Unplugged Activities for Teaching Computer Science (poster) [ACM SIGCSE 2021] Architecture Considerations for Massively Parallel Hardware Security Platform - SPACE 2015 Reconsidering Attacker Models in Ad-hoc Networks - SPW 2016 Evolution of SSL/TLS Indicators and Warnings in Web Browsers [SPW 2019] Security tools demonstration - Tartu 2022 TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips [CHES 2024] “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks [IEEE S&P 2022] “These results must be false”: A usability evaluation of constant-time analysis tools [USENIX Security 2024] The Million-Key Question – Investigating the Origins of RSA Public Keys [Usenix Sec 2016, Best Paper Award] On Secrecy Amplification Protocols - WISTP2015 Codes v. People: A comparative usability study of two password recovery mechanisms - WISTP2016 research running smartcard thesis Astro Photography (link) Výstavka historie výpočetní techniky na FI Job offerings - CRoCS Public CRoCS Survey server publications research wiki Centre for Research on Cryptography and Security Research: Analysis of Trusted Platform Module chips