This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ~~NOTOC~~ ====== Vladimir Sedlacek ====== <ifauth @user> <callout type="primary" icon="true" title="Add your publications">If you have published anything not in the list, please add the bibliography entry to the list. Instructions can be found in the [[https://gitlab.fi.muni.cz/labak/wiki-publications|GitLab repository]]</callout> <callout type="success" icon="true" title="Don't forget submission table and author shares">Note down also the information on rejections and authorship percentages. We keep track of our lab efforts and author shares are useful for dissertation proposal/dissertation/habilitation/... There is a [[:internal:crocs:submissions|dedicated page where to write them]].</callout> </ifauth> ==== 2022==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits**</text>\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:vojtech-suchanek|Vojtech Suchanek]], [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:marek-sys|Marek Sys]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Progress in Cryptology - AFRICACRYPT 2022//, Springer Nature Switzerland, 2022, 493-517.\\ {{:publications:pdf:2022-africacrypt-sedlacek.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-031-17433-9_21|DOI website]], ++ BibTeX |<code>@InProceedings{2022-africacrypt-sedlacek, author = {Vladimir Sedlacek and Vojtech Suchanek and Antonin Dufka and Marek Sys and Vashek Matyas}, title = {DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits}, booktitle = {Progress in Cryptology - AFRICACRYPT 2022}, year = {2022}, publisher = {Springer Nature Switzerland}, address = {Cham}, pages = {493-517}, doi = {10.1007/978-3-031-17433-9_21}, isbn = {978-3-031-17433-9}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://dissect.crocs.fi.muni.cz|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes**</text>\\ [[:publications:authors:antonin-dufka|Antonin Dufka]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings of the 19th International Conference on Security and Cryptography//, SCITEPRESS, 2022, 305-316.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], {{:publications:pdf:2022-secrypt-shine.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0011145600003283|DOI website]], ++ BibTeX |<code>@InProceedings{2022-secrypt-shine, title = {SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes}, author = {Antonin Dufka and Vladimir Sedlacek and Petr Svenda}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography}, pages = {305-316}, publisher = {SCITEPRESS}, year = {2022}, isbn = {978-989-758-590-6}, issn = {2184-7711}, doi = {10.5220/0011145600003283}, keywords = {smartcards, SMPC}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/shine_secrypt22|Details]]</button> </col></grid> ==== 2021==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**A formula for disaster: a unified approach to elliptic curve special-point-based attacks**</text>\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jesus-javier-chi-dominguez|Jesús-Javier Chi-Domínguez]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:billy-bob-brumley|Billy Bob Brumley]],\\ //Advances in Cryptology – ASIACRYPT 2021//, Springer, 2021.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2021-asiacrypt-formulas.pdf|pre-print PDF}}, ++ BibTeX |<code>@InProceedings{2021-asiacrypt-formulas, title = {A formula for disaster: a unified approach to elliptic curve special-point-based attacks}, author = {Vladimir Sedlacek and Jesús-Javier Chi-Domínguez and Jan Jancar and Billy Bob Brumley}, booktitle = {Advances in Cryptology – ASIACRYPT 2021}, publisher = {Springer}, year = {2021}, isbn = {978-3-030-64837-4}, keywords = {ECC, cryptoimplementations, libraries, side-channel}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/formulas_asiacrypt21|Details]]</button> </col></grid> ==== 2020==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Fooling primality tests on smartcards**</text>\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //25th European Symposium on Research in Computer Security (ESORICS) 2020//, Springer, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:primality|primality]], [[:publications:keywords:pseudoprimes|pseudoprimes]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2020-esorics-foolingprimes.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-59013-0\_11|DOI website]], ++ BibTeX |<code>@InProceedings{2020-esorics-foolingprimes, title = {Fooling primality tests on smartcards}, author = {Vladimir Sedlacek and Jan Jancar and Petr Svenda}, booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020}, publisher = {Springer}, year = {2020}, doi = {10.1007/978-3-030-59013-0\_11}, keywords = {ECC, primality, pseudoprimes, smartcards, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/primality_esorics20|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces**</text>\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:marek-sys|Marek Sys]],\\ //Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020//, Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:leakage|leakage]], [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.13154/tches.v2020.i4.281-308|DOI website]], ++ BibTeX |<code>@InProceedings{2020-tches-minerva, title = {Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces}, author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys}, booktitle = {Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020}, publisher = {Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems}, year = {2020}, issn = {2569-2925}, doi = {10.13154/tches.v2020.i4.281-308}, keywords = {ECC, smartcards, libraries, leakage, side-channel, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://minerva.crocs.fi.muni.cz|Details]]</button> </col></grid> ==== 2019==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability**</text>\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT//, SciTePress, 2019, 25-36.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:factorization|factorization]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2019-secrypt-sedlacek.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0007786600250036|DOI website]], ++ BibTeX |<code>@Conference{2019-secrypt-sedlacek, title = {I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability}, author = {Vladimir Sedlacek and Dusan Klinec and Marek Sys and Petr Svenda and Vashek Matyas}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT}, pages = {25-36}, organization = {INSTICC}, publisher = {SciTePress}, year = {2019}, isbn = {978-989-758-378-0}, doi = {10.5220/0007786600250036}, keywords = {ECC, factorization, smartcards, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/public/papers/Secrypt2019|Details]]</button> </col></grid>