Publications

  • Breaking DPA-protected Kyber via the pair-pointwise multiplication
    Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy and Milan Šorf,
    Applied Cryptography and Network Security, Springer Nature, 2024.
    Keywords: pqc, side-channel, BibTeX
  • CNN architecture extraction on edge GPU
    Péter Horváth, Lukasz Chmielewski, Lejla Batina, Léo Weissbart and Yuval Yarom,
    Artificial Intelligence in Hardware Security (AIHWS) Workshop affiliated with ACNS, Springer Nature, 2024.
    Keywords: side-channel, BibTeX
  • TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips
    Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Dan Zatovic and Jan Pospisil,
    IACR Transactions on Cryptographic Hardware and Embedded Systems (2024), IACR, 2024, xx.
    Keywords: tpm, rsa, ecc, cc, fips140, sidechannel, DOI website, BibTeX
  • Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction
    Agata Kruzikova, Michal Muzik, Lenka Knapova, Lenka Dedkova, David Smahel and Vashek Matyas,
    Computers \& Security, 2024, 103667.
    Keywords: usablesec, authentication, DOI website, paper website, BibTeX
  • Enabling Efficient Threshold Signature Computation via Java Card API
    Antonin Dufka and Petr Svenda,
    Proceedings of the 18th International Conference on Availability, Reliability and Security, Association for Computing Machinery, 2023, 11-20.
    Keywords: smartcards, smpc, cryptocurrencies, javacard, pre-print PDF, DOI website, BibTeX
  • Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations
    Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov and Yuval Elovici,
    30th ACM Conference on Computer and Communications Security (CCS'2023), ACM, 2023, 268–280.
    Keywords: cryptolibs, leakage, side-channel, cryptoimplementations, DOI website, BibTeX
  • ProMETHEUS: A Secure Lightweight Spectrum Allocation Protocol against SSDF Attacks in Cognitive Radio IoT Networks
    Milan Patnaik, K. Bharati and Vashek Matyas,
    IEEE Commun. Lett., 2023, 2919–2923.
    Keywords: iot, DOI website, paper website, BibTeX
  • SoK: SCA-secure ECC in software - mission impossible?
    Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel and Peter Schwabe,
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023, 557–589.
    Keywords: ecc, side-channel, DOI website, BibTeX
  • The adoption rate of JavaCard features by certified products and open-source projects
    Lukas Zaoral, Antonin Dufka and Petr Svenda,
    Proceedings of the 22nd Smart Card Research and Advanced Application Conference, Springer, 2023, xx.
    Keywords: javacard, cc, fips140, smartcards, DOI website, BibTeX
  • A Bad Day to Die Hard: Correcting the Dieharder Battery
    Marek Sys, Lubomir Obratil, Vashek Matyas and Dusan Klinec,
    Journal of Cryptology, Springer, 2022, 1–20.
    Keywords: dieharder battery, randomness, p-value, kolmogorov-smirnov test, DOI website, BibTeX
  • A Longitudinal Study of Cryptographic API: A Decade of Android Malware
    Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas and Giorgio Giacinto,
    Proceedings of the 19th International Conference on Security and Cryptography, 2022, 121–133.
    Keywords: cryptolibs, malware, android, paper website, BibTeX
  • Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors
    Martin Ukrop, Michaela Balážová, Pavol Žáčik, Eric Vincent Valčík and Vashek Matyas,
    Proceedings of the 2022 European Symposium on Usable Security, ACM, 2022, 131-144.
    Keywords: usablesec, red-hat, pre-print PDF, DOI website, BibTeX
  • Comparing Nonresponders and Responders of Online Intercept Surveys: A Large-Scale Experimental ICT Security-Related Study
    Lenka Knapova, David Smahel, Lenka Dedkova and Vashek Matyas,
    Human Behavior and Emerging Technologies, Hindawi, 2022, 3107621.
    Keywords: usablesec, DOI website, paper website, BibTeX
  • DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits
    Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys and Vashek Matyas,
    Progress in Cryptology - AFRICACRYPT 2022, Springer Nature Switzerland, 2022, 493-517.
    pre-print PDF, DOI website, BibTeX
  • Even if users do not read security directives, their behavior is not so catastrophic
    Vashek Matyas, Kamil Malinka, Lydia Kraus, Lenka Knapova and Agata Kruzikova,
    Communications of the ACM, ACM, 2022, 37–40.
    Keywords: usablesec, directive, DOI website, BibTeX
  • Experience with Abrupt Transition to Remote Teaching of Embedded Systems
    Jan Koniarik, Daniel Dlhopolcek and Martin Ukrop,
    Proceedings of the 2022 ACM Conference on Innovation and Technology in Computer Science Education, ACM, 2022.
    pre-print PDF, DOI website, paper website, BibTeX
  • JCAlgTest: Robust identification metadata for certified smartcards
    Petr Svenda, Rudolf Kvasnovsky, Imrich Nagy and Antonin Dufka,
    19th International Conference on Security and Cryptography, INSTICC, 2022, 597–604.
    Keywords: smartcards, javacard, DOI website, BibTeX
  • Large-scale randomness study of security margins for 100+ cryptographic functions
    Dusan Klinec, Marek Sys, Karel Kubicek, Petr Svenda and Vashek Matyas,
    INSTICC, 2022, 134–146.
    DOI website, BibTeX
  • Protecting the Most Significant Bits in Scalar Multiplication Algorithms
    Estuardo Alpirez Bock, Lukasz Chmielewski and Konstantina Miteloudi,
    Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings, Springer, 2022, volume 13783 of Lecture Notes in Computer Science, 118–137.
    DOI website, BibTeX
  • SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes
    Antonin Dufka, Vladimir Sedlacek and Petr Svenda,
    Proceedings of the 19th International Conference on Security and Cryptography, SCITEPRESS, 2022, 305-316.
    Keywords: smartcards, smpc, cryptocurrencies, pre-print PDF, DOI website, BibTeX
  • Usability Insights from Establishing TLS Connections
    Lydia Kraus, Matej Grabovsky, Martin Ukrop, Katarina Galanska and Vashek Matyas,
    ICT Systems Security and Privacy Protection, Springer International Publishing, 2022.
    Keywords: usablesec, pre-print PDF, DOI website, BibTeX
  • Usable and secure? User perception of four authentication methods for mobile banking
    Agata Kruzikova, Lenka Knapova, David Smahel, Lenka Dedkova and Vashek Matyas,
    Computers \& Security, 2022, 102603.
    Keywords: usablesec, tacr, authentication, DOI website, paper website, BibTeX
  • A formula for disaster: a unified approach to elliptic curve special-point-based attacks
    Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar and Billy Bob Brumley,
    Advances in Cryptology – ASIACRYPT 2021, Springer, 2021.
    Keywords: ecc, cryptoimplementations, libraries, side-channel, pre-print PDF, BibTeX
  • Challenges Faced by Teaching Assistants in Computer Science Education Across Europe
    Emma Riese, Madeleine Loras, Martin Ukrop and Tomas Effenberger,
    Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education, ACM, 2021.
    pre-print PDF, DOI website, BibTeX
  • How Do Users Chain Email Accounts Together?
    Lydia Kraus, Maria Svidronova and Elizabeth Stobert,
    IFIP International Conference on ICT Systems Security and Privacy Protection, Springer, Cham, 2021, .
    Keywords: usablesec, pre-print PDF, BibTeX
  • The Stack: Unplugged Activities for Teaching Computer Science (poster)
    Valdemar Svabensky and Martin Ukrop,
    Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, ACM, 2021.
    pre-print PDF, DOI website, BibTeX
  • Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior
    Lenka Knapova, Agata Kruzikova, Lenka Dedkova and David Smahel,
    Cyberpsychology, Behavior, and Social Networking, Mary Ann Liebert, Inc., 2021, 584-592.
    Keywords: usablesec, paper website, BibTeX
  • Biased RSA private keys: Origin attribution of GCD-factorable keys
    Adam Janovsky, Matus Nemec, Petr Svenda, Peter Sekan and Vashek Matyas,
    25th European Symposium on Research in Computer Security (ESORICS) 2020, Springer, 2020.
    Keywords: rsa, bias, classification, smartcard, cryptoimplementations, BibTeX
  • Evolution of SSL/TLS Indicators and Warnings in Web Browsers
    Lydia Kraus, Martin Ukrop, Vashek Matyas and Tobias Fiebig,
    27th International Workshop on Security Protocols (SPW 2019), Springer International Publishing, 2020, 267–280.
    Keywords: usablesec, pre-print PDF, DOI website, BibTeX
  • Fooling primality tests on smartcards
    Vladimir Sedlacek, Jan Jancar and Petr Svenda,
    25th European Symposium on Research in Computer Security (ESORICS) 2020, Springer, 2020.
    Keywords: ecc, primality, pseudoprimes, smartcards, cryptoimplementations, pre-print PDF, DOI website, BibTeX
  • JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
    Vasilios Mavroudis and Petr Svenda,
    IEEE, 2020, 64–71.
    Keywords: ecc, smartcards, opentools, smpc, DOI website, BibTeX
  • Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
    Jan Jancar, Vladimir Sedlacek, Petr Svenda and Marek Sys,
    Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020, Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems, 2020.
    Keywords: ecc, smartcards, libraries, leakage, side-channel, cryptoimplementations, DOI website, BibTeX
  • Privacy-Friendly Monero Transaction Signing on a Hardware Wallet
    Dusan Klinec and Vashek Matyas,
    ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings, Springer, 2020, volume 580 of {IFIP} Advances in Information and Communication Technology, 338–351.
    Keywords: monero, bulletproofs, hardware wallets, cryptocurrencies, cryptoimplementations, pre-print PDF, DOI website, BibTeX
  • Privacy-Friendly Monero Transaction Signing on a Hardware Wallet
    Dusan Klinec and Vashek Matyas,
    ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings, Springer, 2020, volume 580 of {IFIP} Advances in Information and Communication Technology, 338–351.
    Keywords: monero, bulletproofs, hardware wallets, cryptocurrency, cryptoimplementations, smpc, pre-print PDF, DOI website, BibTeX
  • Teaching Lab: Training Novice Computer Science Teachers (poster)
    Martin Ukrop, Valdemar Svabensky and Imrich Nagy,
    Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, ACM, 2020.
    pre-print PDF, DOI website, BibTeX
  • User Testing of Mobile Banking Authentication Methods: UX Testing, User Interviews and Quantitative Survey
    Agata Kruzikova, Lenka Knapova, Ondrej Gabrhelik, David Smahel, Lenka Dedkova, Vashek Matyas, Petr Dolezal and Martina Smahelova,
    Technical report, Masaryk University, 2020.
    pre-print PDF, BibTeX
  • Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)
    Martin Ukrop, Lydia Kraus and Vashek Matyas,
    Digital Threats: Research and Practice, Association for Computing Machinery, 2020.
    Keywords: usablesec, red-hat, pre-print PDF, DOI website, BibTeX
  • BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256
    Marek Sys, Dusan Klinec, Karel Kubicek and Petr Svenda,
    E-Business and Telecommunications, Springer International Publishing, 2019, 123–149.
    Keywords: randomness, hypothesis, boolean, BibTeX
  • BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256
    Marek Sys, Dusan Klinec, Karel Kubicek and Petr Svenda,
    E-Business and Telecommunications, Springer International Publishing, 2019, 123–149.
    Keywords: randomness, hypothesis, boolean, BibTeX
  • Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques
    Vojtech Mrazek, Marek Sys and Petr Svenda,
    IEEE Transactions on Very Large Scale Integration (VLSI) Systems, IEEE, 2019.
    Keywords: fpga, genetic-algorithms, randomness, distinguishers, DOI website, BibTeX
  • Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks
    Lukas Nemec, Vashek Matyas, Radim Ostadal, Petr Svenda and Pierre-Louis Palant,
    Sensors, Multidisciplinary Digital Publishing Institute, 2019.
    Keywords: wsn, DOI website, paper website, BibTeX
  • I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability
    Vladimir Sedlacek, Dusan Klinec, Marek Sys, Petr Svenda and Vashek Matyas,
    Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT, SciTePress, 2019, 25-36.
    Keywords: ecc, factorization, smartcards, cryptoimplementations, pre-print PDF, DOI website, BibTeX
  • Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem
    Stefano Calzavara, Riccardo Focardi, Matus Nemec, Alvise Rabitti and Marco Squarcina,
    2019 IEEE Symposium on Security and Privacy (SP), IEEE, 2019.
    DOI website, BibTeX
  • Reflective Diary for Professional Development of Novice Teachers
    Martin Ukrop, Valdemar Svabensky and Jan Nehyba,
    Proceedings of the 50th ACM Technical Symposium on Computer Science Education, ACM, 2019, 1088–1094.
    pre-print PDF, DOI website, BibTeX
  • Will You Trust This TLS Certificate? Perceptions of People Working in IT
    Martin Ukrop, Lydia Kraus, Vashek Matyas and Heider Ahmad Mutleq Wahsheh,
    Proceedings of the 35rd Annual Computer Security Applications Conference (ACSAC'2019), ACM, 2019.
    Keywords: usablesec, red-hat, pre-print PDF, DOI website, BibTeX
  • A Large-scale Comparative Study of Beta Testers and Regular Users
    Vlasta Stavova, Lenka Dedkova, Martin Ukrop and Vashek Matyas,
    Communications of the ACM, ACM, 2018, 64–71.
    Keywords: usablesec, eset, pre-print PDF, DOI website, BibTeX
  • Adaptive Secrecy Amplification with Radio Channel Key Extraction
    Lukas Nemec, Radim Ostadal, Vashek Matyas and Petr Svenda,
    2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2018, 123-130.
    Keywords: wsn, DOI website, BibTeX
  • Entropy Crowdsourcing – Protocols for Link Key Updates in Wireless Sensor Networks
    Lukas Nemec, Radim Ostadal, Vashek Matyas and Petr Svenda,
    Security Protocols Workshop XXVI, Springer International Publishing, 2018, 84-92.
    Keywords: wsn, BibTeX
  • Evolving Boolean Functions for Fast and Efficient Randomness Testing
    Vojtech Mrazek, Marek Sys, Zdenek Vasicek, Lukas Sekanina and Vashek Matyas,
    Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '18), Association for Computing Machinery, 2018, 1302–1309.
    DOI website, BibTeX
  • Experimental large-scale review of attractors for detection of potentially unwanted applications
    Vlasta Stavova, Lenka Dedkova, Vashek Matyas, Mike Just, David Smahel and Martin Ukrop,
    Computers \& Security, 2018, 92–100.
    Keywords: usablesec, eset, gamu, DOI website, paper website, BibTeX
  • Why Johnny the Developer Can't Work with Public Key Certificates: An Experimental Study of OpenSSL Usability
    Martin Ukrop and Vashek Matyas,
    Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, Springer International Publishing, 2018, 45–64.
    Keywords: usablesec, red-hat, pre-print PDF, DOI website, BibTeX
  • A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components
    Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec and George Danezis,
    24th ACM Conference on Computer and Communications Security (CCS'2017), ACM, 2017, 1583–1600.
    Keywords: smartcards, smpc, BibTeX
  • Factors Influencing the Purchase of Security Software for Mobile Devices – Case Study
    Vlasta Stavova, Vashek Matyas, Mike Just and Martin Ukrop,
    Infocommunications Journal, 2017, 18–23.
    Keywords: usablesec, eset, gamu, pre-print PDF, paper website, BibTeX
  • Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans
    Matus Nemec, Dusan Klinec, Petr Svenda, Peter Sekan and Vashek Matyas,
    Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), ACM, 2017.
    Keywords: cryptolibs, rsa, fingerprinting, smartcard, cryptoimplementations, DOI website, BibTeX
  • The Efficient Randomness Testing using Boolean Functions
    Marek Sys, Dusan Klinec and Petr Svenda,
    The 14th International Conference on Security and Cryptography (Secrypt'2017), SCITEPRESS, 2017, 92–103.
    Keywords: eacirc, randomness, BibTeX
  • The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli
    Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec and Vashek Matyas,
    24th ACM Conference on Computer and Communications Security (CCS'2017), ACM, 2017, 1631–1648.
    Keywords: rsa, cryptoimplementations, BibTeX
  • Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm
    Marek Sys, Zdenek Riha and Vashek Matyas,
    ACM Transactions on Mathematicsl Software, ACM, 2016, 27:1–27:11.
    Keywords: randomness, DOI website, BibTeX
  • Attack Detection Using Evolutionary Computation
    Martin Stehlik, Vashek Matyas and Andriy Stetsko,
    Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges, Springer series on Studies in Computational Intelligence, 2016.
    Keywords: wsn, BibTeX
  • Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case
    Radim Ostadal, Petr Svenda and Vashek Matyas,
    International Conference on Cryptology and Network Security (CANS 2016), Springer, 2016.
    Keywords: wsn, BibTeX
  • Avalanche Effect in Improperly Initialized CAESAR Candidates
    Martin Ukrop and Petr Svenda,
    Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016, Open Publishing Association, 2016, volume 233 of Electronic Proceedings in Theoretical Computer Science, 72-81.
    Keywords: eacirc, randomness, pre-print PDF, DOI website, BibTeX
  • Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms
    Vlasta Stavova, Vashek Matyas and Mike Just,
    IFIP International Conference on Information Security Theory and Practice, 2016, 35–50.
    Keywords: usablesec, sodatsw, gamu, DOI website, BibTeX
  • New results on reduced-round Tiny Encryption Algorithm using genetic programming
    Karel Kubicek, Jiri Novotny, Petr Svenda and Martin Ukrop,
    IEEE Infocommunications, 2016.
    Keywords: eacirc, randomness, pre-print PDF, paper website, BibTeX
  • On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications
    Vlasta Stavova, Vashek Matyas and Mike Just,
    Euro Usable Security (EuroUSEC) Workshop Programme, 2016.
    Keywords: usablesec, eset, pua, gamu, DOI website, BibTeX
  • Randomness Testing: Result Interpretation and Speed
    Marek Sys and Vashek Matyas,
    The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, Springer Berlin Heidelberg, 2016, 389–395.
    DOI website, paper website, BibTeX
  • Reconsidering Attacker Models in Ad-hoc Networks
    Radim Ostadal, Petr Svenda and Vashek Matyas,
    24th International Workshop on Security Protocols (SPW 2016), Springer, 2016.
    Keywords: wsn, BibTeX
  • The Million-Key Question – Investigating the Origins of RSA Public Keys
    Petr Svenda, Matus Nemec, Peter Sekan, Rudolf Kvasnovsky, David Formanek, David Komarek and Vashek Matyas,
    FI MU Report Series, FIMU-RS-2016-03, Masaryk University, 2016, 1–83.
    Keywords: rsa, BibTeX
  • The Million-Key Question – Investigating the Origins of RSA Public Keys
    Petr Svenda, Matus Nemec, Peter Sekan, Rudolf Kvasnovsky, David Formanek, David Komarek and Vashek Matyas,
    The 25th USENIX Security Symposium (UsenixSec'2016), USENIX, 2016, 893–910.
    Keywords: rsa, cryptoimplementations, pre-print PDF, BibTeX
  • Towards better selective forwarding and delay attacks detection in wireless sensor networks
    Martin Stehlik, Vashek Matyas and Andriy Stetsko,
    2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC), 2016, 1-6.
    Keywords: wsn, DOI website, BibTeX
  • Architecture Considerations for Massively Parallel Hardware Security Platform
    Dan Cvrcek and Petr Svenda,
    The 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE–2015), LNCS 9354, Springer, 2015, 269–288.
    DOI website, BibTeX
  • Challenges of fiction in network security – perspective of virtualized environments
    Vit Bukac, Radim Ostadal, Petr Svenda, Tatevik Baghdasaryan and Vashek Matyas,
    Cambridge International Workshop on Security Protocols, Springer, 2015.
    BibTeX
  • DDoSaaS: DDoS jako služba
    Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Riha and Vashek Matyas,
    IS2: From trends to solutions, Tate International, 2015, 35-39.
    Keywords: ddosaas, BibTeX
  • On Secrecy Amplification Protocols
    Radim Ostadal, Petr Svenda and Vashek Matyas,
    The 9th WISTP International Conference on Information Security Theory and Practice (WISTP–2015), LNCS 9311, Springer, 2015, 3–19.
    Keywords: wsn, DOI website, BibTeX
  • Service in Denial – Clouds Going with the Winds
    Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Riha and Vashek Matyas,
    Proceedings of the 9th International Conference on Network and System Security, Springer International Publishing, 2015, 130-143.
    Keywords: ddosaas, DOI website, paper website, BibTeX
  • The challenge of increasing safe response of antivirus software users
    Vlasta Stavova, Vashek Matyas and Kamil Malinka,
    International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, 2015, 133–143.
    Keywords: usablesec, eset, gamu, DOI website, BibTeX
  • WSNProtectLayer: Security Middleware for Wireless Sensor Networks
    Vashek Matyas, Petr Svenda, Andriy Stetsko, Dusan Klinec, Filip Jurnecka and Martin Stehlik,
    Securing Cyber-Physical Systems, CRC Press, 2015, 119-162.
    Keywords: wsn, DOI website, BibTeX
  • A New Approach to SA in Partially Compromised Networks
    Radim Ostadal, Petr Svenda and Vashek Matyas,
    Security, Privacy, and Applied Cryptography Engineering – 4th Int. Conf., SPACE 2014, LNCS 8804, Springer, 2014.
    Keywords: wsn, BibTeX
  • Constructing empirical tests of randomness
    Marek Sys, Petr Svenda, Martin Ukrop and Vashek Matyas,
    2014 11th International Conference on Security and Cryptography (SECRYPT), 2014, 1–9.
    pre-print PDF, BibTeX
  • Constructing empirical tests of randomness
    Marek Sys, Petr Svenda, Martin Ukrop and Vashek Matyas,
    Proceedings of the 11th International Conference on Security and Cryptography, 2014.
    Keywords: eacirc, randomness, pre-print PDF, DOI website, BibTeX
  • Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits
    Petr Svenda, Martin Ukrop and Vashek Matyas,
    E-Business and Telecommunications, Springer Berlin Heidelberg, 2014, 290–305.
    Keywords: eacirc, randomness, pre-print PDF, DOI website, BibTeX
  • Evaluation of key management schemes in wireless sensor networks
    Filip Jurnecka, Martin Stehlik and Vashek Matyas,
    Security and Trust Management, Springer International Publishing, 2014, 198-203.
    Keywords: wsn, DOI website, paper website, BibTeX
  • Faster Randomness Testing with the NIST Statistical Test Suite
    Marek Sys and Zdenek Riha,
    International Conference on Security, Privacy, and Applied Cryptography Engineering, 2014, 272–284.
    BibTeX
  • Improving Intrusion Detection Systems for Wireless Sensor Networks
    Andriy Stetsko, Tobias Smolka, Vashek Matyas and Martin Stehlik,
    Applied Cryptography and Network Security, Springer International Publishing, 2014, volume 8479 of Lecture Notes in Computer Science, 343-360.
    Keywords: wsn, DOI website, BibTeX
  • On Node Capturing Attacker Strategies
    Filip Jurnecka, Martin Stehlik and Vashek Matyas,
    Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers, Springer LNCS, 2014, 300-315.
    Keywords: wsn, DOI website, BibTeX
  • Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks
    Martin Stehlik, Adam Saleh, Andriy Stetsko and Vashek Matyas,
    Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems, MIT Press, 2013, 569-576.
    Keywords: wsn, paper website, BibTeX
  • On the origin of yet another channel
    Petr Svenda and Vashek Matyas,
    Springer, 2013.
    Keywords: eacirc, pre-print PDF, BibTeX
  • Towards cryptographic function distinguishers with evolutionary circuits
    Petr Svenda, Martin Ukrop and Vashek Matyas,
    Proceedings of the 10th International Conference on Security and Cryptography, 2013, 135–146.
    Keywords: eacirc, randomness, pre-print PDF, DOI website, BibTeX
  • Evolutionary Design of Message Efficient Secrecy Amplification Protocols
    Tobias Smolka, Petr Svenda, Lukas Sekanina and Vashek Matyas,
    Genetic Programming, Berlin: Springer Verlag, 2012, 194–205.
    Keywords: wsn, BibTeX
  • Two improvements of random key predistribution for wireless sensor networks
    Jiri Kur, Vashek Matyas and Petr Svenda,
    International Conference on Security and Privacy in Communication Systems, 2012, 61–75.
    Keywords: wsn, BibTeX
  • Attack detection vs. privacy–How to find the link or how to hide it?
    Jiri Kur, Vashek Matyas, Andriy Stetsko and Petr Svenda,
    International Workshop on Security Protocols, 2011, 189–199.
    Keywords: wsn, BibTeX
  • Calibrating and Comparing Simulators for Wireless Sensor Networks
    Andriy Stetsko, Martin Stehlik and Vashek Matyas,
    Proceedings of the 8\superscriptth IEEE International Conference on Mobile Adhoc and Sensor Systems, IEEE Computer Society, 2011, 733-738.
    Keywords: wsn, BibTeX
  • Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks
    Andriy Stetsko and Vashek Matyas,
    EC2ND 2009 – European Conference on Computer Network Defense, IEEE Computer Society, 2009, 21-28.
    Keywords: wsn, BibTeX
  • Evolutionary design of secrecy amplification protocols for wireless sensor networks
    Petr Svenda, Lukas Sekanina and Vashek Matyas,
    Proceedings of the second ACM Conference on Wireless Network Security, 2009, 225–236.
    Keywords: wsn, BibTeX