This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ~~NOTOC~~ ====== Publications ====== <ifauth @user> <callout type="primary" icon="true" title="Add your publications">If you have published anything not in the list, please add the bibliography entry to the list. Instructions can be found in the [[https://gitlab.fi.muni.cz/labak/wiki-publications|GitLab repository]]</callout> <callout type="success" icon="true" title="Don't forget submission table and author shares">Note down also the information on rejections and authorship percentages. We keep track of our lab efforts and author shares are useful for dissertation proposal/dissertation/habilitation/... There is a [[:internal:crocs:submissions|dedicated page where to write them]].</callout> </ifauth> ==== 2022==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Even if users do not read security directives, their behavior is not so catastrophic**</text>\\ [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:kamil-malinka|Kamil Malinka]], [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:lenka-knapova|Lenka Knapova]] and [[:publications:authors:agata-kruzikova|Agata Kruzikova]],\\ //Communications of the ACM//, ACM, 2022, 37--40.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:directive|directive]], [[http://dx.doi.org/10.1145/3471928|DOI website]], ++ BibTeX |<code>@Article{2022-cacm-matyas, title = {Even if users do not read security directives, their behavior is not so catastrophic}, author = {Vashek Matyas and Kamil Malinka and Lydia Kraus and Lenka Knapova and Agata Kruzikova}, journal = {Communications of the ACM}, volume = {65}, number = {1}, pages = {37--40}, publisher = {ACM}, year = {2022}, doi = {10.1145/3471928}, keywords = {usablesec, directive}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/cacm2022|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Usability Insights from Establishing TLS Connections**</text>\\ [[:publications:authors:lydia-kraus--matej-grabovsky--martin-ukrop--katarina-galanska|Lydia Kraus, Matěj Grabovský, Martin Ukrop, Katarína Galanská]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ICT Systems Security and Privacy Protection//, Springer International Publishing, 2022.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2022-ifipsec-kraus.pdf|pre-print PDF}}, ++ BibTeX |<code>@InProceedings{2022-ifipsec-kraus, title = {Usability Insights from Establishing TLS Connections}, author = {Lydia Kraus, Matěj Grabovský, Martin Ukrop, Katarína Galanská and Vashek Matyas}, booktitle = {ICT Systems Security and Privacy Protection}, series = {IFIP Advances in Information and Communication Technology}, publisher = {Springer International Publishing}, year = {2022}, keywords = {usablesec}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/ifipsec2022|Details]]</button> </col></grid> * <text size="large">**Usable and secure? User perception of four authentication methods for mobile banking**</text>\\ [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:david-smahel|David Smahel]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Computers \& Security//, 2022, 102603.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:tacr|tacr]], [[:publications:keywords:authentication|authentication]], [[http://dx.doi.org/10.1016/j.cose.2022.102603|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404822000025|paper website]], ++ BibTeX |<code>@Article{2022-compsec-kruzikova, title = {Usable and secure? User perception of four authentication methods for mobile banking}, author = {Agata Kruzikova and Lenka Knapova and David Smahel and Lenka Dedkova and Vashek Matyas}, journal = {Computers \& Security}, volume = {115}, pages = {102603}, year = {2022}, issn = {0167-4048}, doi = {10.1016/j.cose.2022.102603}, url = {https://www.sciencedirect.com/science/article/pii/S0167404822000025}, keywords = {usablesec, TACR, authentication}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks**</text>\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:marcel-fourne|Marcel Fourné]], [[:publications:authors:daniel-de-almeida-braga|Daniel De Almeida Braga]], [[:publications:authors:mohamed-sabt|Mohamed Sabt]], [[:publications:authors:peter-schwabe|Peter Schwabe]], [[:publications:authors:gilles-barthe|Gilles Barthe]], [[:publications:authors:pierre-alain-fouque|Pierre-Alain Fouque]] and [[:publications:authors:yasemin-acar|Yasemin Acar]],\\ //43rd IEEE Symposium on Security and Privacy//, IEEE, 2022.\\ Keywords: [[:publications:keywords:constant-time|constant-time]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2022-sp-jancar.pdf|pre-print PDF}}, ++ BibTeX |<code>@InProceedings{2022-sp-jancar, title = {“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, author = {Jan Jancar and Marcel Fourné and Daniel De Almeida Braga and Mohamed Sabt and Peter Schwabe and Gilles Barthe and Pierre-Alain Fouque and Yasemin Acar}, booktitle = {43rd IEEE Symposium on Security and Privacy}, publisher = {IEEE}, address = {San Francisco}, location = {San Francisco}, year = {2022}, keywords = {constant-time, cryptoimplementations, usablesec, libraries, side-channel}, language = {eng}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/usablect_sp22|Details]]</button> </col></grid> ==== 2021==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**A formula for disaster: a unified approach to elliptic curve special-point-based attacks**</text>\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jesus-javier-chi-dominguez|Jesús-Javier Chi-Domínguez]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:billy-bob-brumley|Billy Bob Brumley]],\\ //Advances in Cryptology – ASIACRYPT 2021//, Springer, 2021.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2021-asiacrypt-formulas.pdf|pre-print PDF}}, ++ BibTeX |<code>@InProceedings{2021-asiacrypt-formulas, title = {A formula for disaster: a unified approach to elliptic curve special-point-based attacks}, author = {Vladimir Sedlacek and Jesús-Javier Chi-Domínguez and Jan Jancar and Billy Bob Brumley}, booktitle = {Advances in Cryptology – ASIACRYPT 2021}, publisher = {Springer}, year = {2021}, isbn = {978-3-030-64837-4}, keywords = {ECC, cryptoimplementations, libraries, side-channel}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/formulas_asiacrypt21|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Challenges Faced by Teaching Assistants in Computer Science Education Across Europe**</text>\\ [[:publications:authors:emma-riese|Emma Riese]], [[:publications:authors:madeleine-loras|Madeleine Loras]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:tomas-effenberger|Tomas Effenberger]],\\ //Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education//, ACM, 2021.\\ {{:publications:pdf:2021-iticse-riese.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3430665.3456304|DOI website]], ++ BibTeX |<code>@InProceedings{2021-iticse-riese, title = {Challenges Faced by Teaching Assistants in Computer Science Education Across Europe}, author = {Emma Riese and Madeleine Loras and Martin Ukrop and Tomas Effenberger}, booktitle = {Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education}, series = {ITiCSE ’21}, publisher = {ACM}, location = {Padeborn, Germany}, year = {2021}, doi = {10.1145/3430665.3456304}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/iticse2021|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**How Do Users Chain Email Accounts Together?**</text>\\ [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:maria-svidronova|Maria Svidronova]] and [[:publications:authors:elizabeth-stobert|Elizabeth Stobert]],\\ //IFIP International Conference on ICT Systems Security and Privacy Protection//, Springer, Cham, 2021, .\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2021-ifipsec-kraus.pdf|pre-print PDF}}, ++ BibTeX |<code>@InProceedings{2021-ifipsec-kraus, title = {How Do Users Chain Email Accounts Together?}, author = {Lydia Kraus and Maria Svidronova and Elizabeth Stobert}, booktitle = {IFIP International Conference on ICT Systems Security and Privacy Protection}, pages = {}, publisher = {Springer, Cham}, year = {2021}, keywords = {usablesec}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/ifipsec2021|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**The Stack: Unplugged Activities for Teaching Computer Science (poster)**</text>\\ [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Proceedings of the 52nd ACM Technical Symposium on Computer Science Education//, ACM, 2021.\\ {{:publications:pdf:2021-sigcse-svabensky.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3408877.3439569|DOI website]], ++ BibTeX |<code>@InProceedings{2021-sigcse-svabensky, title = {The Stack: Unplugged Activities for Teaching Computer Science (poster)}, author = {Valdemar Svabensky and Martin Ukrop}, booktitle = {Proceedings of the 52nd ACM Technical Symposium on Computer Science Education}, series = {SIGCSE ’21}, publisher = {ACM}, location = {Virtual}, year = {2021}, isbn = {978-1-4503-8062-1}, doi = {10.1145/3408877.3439569}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/sigcse2021|Details]]</button> </col></grid> * <text size="large">**Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior**</text>\\ [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]] and [[:publications:authors:david-smahel|David Smahel]],\\ //Cyberpsychology, Behavior, and Social Networking//, Mary Ann Liebert, Inc., 2021, 584-592.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[https://www.liebertpub.com/doi/full/10.1089/cyber.2020.0599|paper website]], ++ BibTeX |<code>@Article{2021-cyberpsychology-knapova, title = {Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior}, author = {Lenka Knapova and Agata Kruzikova and Lenka Dedkova and David Smahel}, journal = {Cyberpsychology, Behavior, and Social Networking}, pages = {584-592}, publisher = {Mary Ann Liebert, Inc.}, year = {2021}, url = {https://www.liebertpub.com/doi/full/10.1089/cyber.2020.0599}, keywords = {usablesec}, } </code>++ ==== 2020==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Biased RSA private keys: Origin attribution of GCD-factorable keys**</text>\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:peter-sekan|Peter Sekan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //25th European Symposium on Research in Computer Security (ESORICS) 2020//, Springer, 2020.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:bias|bias]], [[:publications:keywords:classification|classification]], [[:publications:keywords:smartcard|smartcard]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], ++ BibTeX |<code>@InProceedings{2020-esorics-privrsabias, title = {Biased RSA private keys: Origin attribution of GCD-factorable keys}, author = {Adam Janovsky and Matus Nemec and Petr Svenda and Peter Sekan and Vashek Matyas}, booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020}, publisher = {Springer}, year = {2020}, keywords = {RSA, bias, classification, smartcard, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/privrsa_esorics20|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Evolution of SSL/TLS Indicators and Warnings in Web Browsers**</text>\\ [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:tobias-fiebig|Tobias Fiebig]],\\ //27th International Workshop on Security Protocols (SPW 2019)//, Springer International Publishing, 2020, 267--280.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], {{:publications:pdf:2019-spw-kraus.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-57043-9_25|DOI website]], ++ BibTeX |<code>@InProceedings{2019-spw-kraus, title = {Evolution of SSL/TLS Indicators and Warnings in Web Browsers}, author = {Lydia Kraus and Martin Ukrop and Vashek Matyas and Tobias Fiebig}, booktitle = {27th International Workshop on Security Protocols (SPW 2019)}, pages = {267--280}, publisher = {Springer International Publishing}, year = {2020}, doi = {10.1007/978-3-030-57043-9_25}, keywords = {usablesec}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/spw2019|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Fooling primality tests on smartcards**</text>\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //25th European Symposium on Research in Computer Security (ESORICS) 2020//, Springer, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:primality|primality]], [[:publications:keywords:pseudoprimes|pseudoprimes]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2020-esorics-foolingprimes.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-59013-0\_11|DOI website]], ++ BibTeX |<code>@InProceedings{2020-esorics-foolingprimes, title = {Fooling primality tests on smartcards}, author = {Vladimir Sedlacek and Jan Jancar and Petr Svenda}, booktitle = {25th European Symposium on Research in Computer Security (ESORICS) 2020}, publisher = {Springer}, year = {2020}, doi = {10.1007/978-3-030-59013-0\_11}, keywords = {ECC, primality, pseudoprimes, smartcards, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/primality_esorics20|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets**</text>\\ [[:publications:authors:vasilios-mavroudis|Vasilios Mavroudis]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ IEEE, 2020, 64--71.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:opentools|opentools]], [[:publications:keywords:smpc|smpc]], [[http://dx.doi.org/10.1109/EuroSPW51379.2020.00022|DOI website]], ++ BibTeX |<code>@Article{2020-jcmathlib-cybercert, title = {JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets}, author = {Vasilios Mavroudis and Petr Svenda}, volume = {61}, number = {2}, pages = {64--71}, publisher = {IEEE}, year = {2020}, doi = {10.1109/EuroSPW51379.2020.00022}, keywords = {ECC, smartcards, opentools, smpc}, conference = {First International Workshop on Lightweight and Incremental Cybersecurity Certification}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/cybercert2020|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces**</text>\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:marek-sys|Marek Sys]],\\ //Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020//, Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:leakage|leakage]], [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.13154/tches.v2020.i4.281-308|DOI website]], ++ BibTeX |<code>@InProceedings{2020-tches-minerva, title = {Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces}, author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys}, booktitle = {Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020}, publisher = {Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems}, year = {2020}, issn = {2569-2925}, doi = {10.13154/tches.v2020.i4.281-308}, keywords = {ECC, smartcards, libraries, leakage, side-channel, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://minerva.crocs.fi.muni.cz|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Privacy-Friendly Monero Transaction Signing on a Hardware Wallet**</text>\\ [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings//, Springer, 2020, volume 580 of {IFIP} Advances in Information and Communication Technology, 338--351.\\ Keywords: [[:publications:keywords:monero|monero]], [[:publications:keywords:bulletproofs|bulletproofs]], [[:publications:keywords:hardware wallets|hardware wallets]], [[:publications:keywords:cryptocurrency|cryptocurrency]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:smpc|smpc]], {{:publications:pdf:2020-ifipsec-klinec.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-030-58201-2\_23|DOI website]], ++ BibTeX |<code>@InProceedings{2020-ifipsec-klinec, title = {Privacy-Friendly Monero Transaction Signing on a Hardware Wallet}, author = {Dusan Klinec and Vashek Matyas}, booktitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {580}, pages = {338--351}, publisher = {Springer}, year = {2020}, doi = {10.1007/978-3-030-58201-2\_23}, keywords = {Monero, Bulletproofs, hardware wallets, cryptocurrency, cryptoimplementations, SMPC}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/public/papers/monero_ifipsec20|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Teaching Lab: Training Novice Computer Science Teachers (poster)**</text>\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:imrich-nagy|Imrich Nagy]],\\ //Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education//, ACM, 2020.\\ {{:publications:pdf:2020-iticse-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3341525.3393967|DOI website]], ++ BibTeX |<code>@InProceedings{2020-iticse-ukrop, title = {Teaching Lab: Training Novice Computer Science Teachers (poster)}, author = {Martin Ukrop and Valdemar Svabensky and Imrich Nagy}, booktitle = {Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education}, series = {ITiCSE ’20}, publisher = {ACM}, location = {Trondheim, Norway}, year = {2020}, isbn = {978-1-4503-6874-2}, doi = {10.1145/3341525.3393967}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/iticse2020|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**User Testing of Mobile Banking Authentication Methods: UX Testing, User Interviews and Quantitative Survey**</text>\\ [[:publications:authors:agata-kruzikova|Agata Kruzikova]], [[:publications:authors:lenka-knapova|Lenka Knapova]], [[:publications:authors:ondrej-gabrhelik|Ondrej Gabrhelik]], [[:publications:authors:david-smahel|David Smahel]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:vaclav-matyas|Vaclav Matyas]], [[:publications:authors:petr-dolezal|Petr Dolezal]] and [[:publications:authors:martina-smahelova|Martina Smahelova]],\\ Technical report, Masaryk University, 2020.\\ {{:publications:pdf:2020-tacr-report.pdf|pre-print PDF}}, ++ BibTeX |<code>@TechReport{2020-tacr-report, title = {User Testing of Mobile Banking Authentication Methods: UX Testing, User Interviews and Quantitative Survey}, author = {Agata Kruzikova and Lenka Knapova and Ondrej Gabrhelik and David Smahel and Lenka Dedkova and Vaclav Matyas and Petr Dolezal and Martina Smahelova}, publisher = {Technical report, Masaryk University}, year = {2020}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/2020-tacr-report|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)**</text>\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:lydia-kraus|Lydia Kraus]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Digital Threats: Research and Practice//, Association for Computing Machinery, 2020.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2020-dtrap-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3419472|DOI website]], ++ BibTeX |<code>@Article{2020-dtrap-ukrop, title = {Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)}, author = {Martin Ukrop and Lydia Kraus and Vashek Matyas}, journal = {Digital Threats: Research and Practice}, volume = {1}, number = {4}, numpages = {30}, publisher = {Association for Computing Machinery}, year = {2020}, issn = {2692-1626}, doi = {10.1145/3419472}, keywords = {usablesec, Red-Hat}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/dtrap2020|Details]]</button> </col></grid> ==== 2019==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256**</text>\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:karel-kubicek|Karel Kubicek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //E-Business and Telecommunications//, Springer International Publishing, 2019, 123--149.\\ Keywords: [[:publications:keywords:randomness|randomness]], [[:publications:keywords:hypothesis|hypothesis]], [[:publications:keywords:boolean|boolean]], ++ BibTeX |<code>@InProceedings{2019-secrypt2017selected-sys, title = {BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256}, author = {Marek Sys and Dusan Klinec and Karel Kubicek and Petr Svenda}, booktitle = {E-Business and Telecommunications}, pages = {123--149}, publisher = {Springer International Publishing}, address = {Cham}, year = {2019}, isbn = {978-3-030-11039-0}, keywords = {randomness, hypothesis, boolean}, editor = {Obaidat, Mohammad S. and Cabello, Enrique}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[http://crcs.cz/papers/Secrypt2017selected|Details]]</button> </col></grid> * <text size="large">**BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256**</text>\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:karel-kubicek|Karel Kubicek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //E-Business and Telecommunications//, Springer International Publishing, 2019, 123--149.\\ Keywords: [[:publications:keywords:randomness|randomness]], [[:publications:keywords:hypothesis|hypothesis]], [[:publications:keywords:boolean|boolean]], ++ BibTeX |<code>@InProceedings{2019-secrypt2017selected-sys, title = {BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256}, author = {Marek Sys and Dusan Klinec and Karel Kubicek and Petr Svenda}, booktitle = {E-Business and Telecommunications}, pages = {123--149}, publisher = {Springer International Publishing}, address = {Cham}, year = {2019}, isbn = {978-3-030-11039-0}, keywords = {randomness, hypothesis, boolean}, editor = {Obaidat, Mohammad S. and Cabello, Enrique}, } </code>++ * <text size="large">**Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques**</text>\\ [[:publications:authors:vojtech-mrazek|Vojtech Mrazek]] and [[:publications:authors:marek-sys-a-petr-svenda|Marek Sys a Petr Svenda]],\\ //IEEE Transactions on Very Large Scale Integration (VLSI) Systems//, IEEE, 2019.\\ Keywords: [[:publications:keywords:fpga|fpga]], [[:publications:keywords:genetic-algorithms|genetic-algorithms]], [[:publications:keywords:randomness|randomness]], [[:publications:keywords:distinguishers|distinguishers]], [[http://dx.doi.org/10.1109/TVLSI.2019.2923848|DOI website]], ++ BibTeX |<code>@InProceedings{2019-ieeevsli-mrazek, title = {Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques}, author = {Vojtech Mrazek and Marek Sys a Petr Svenda}, booktitle = {IEEE Transactions on Very Large Scale Integration (VLSI) Systems}, publisher = {IEEE}, year = {2019}, issn = {1557-9999}, doi = {10.1109/TVLSI.2019.2923848}, keywords = {FPGA, genetic-algorithms, randomness, distinguishers}, } </code>++ * <text size="large">**Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks**</text>\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:pierre-louis-palant|Pierre-Louis Palant]],\\ //Sensors//, Multidisciplinary Digital Publishing Institute, 2019.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.3390/s19040914|DOI website]], [[http://www.mdpi.com/1424-8220/19/4/914|paper website]], ++ BibTeX |<code>@Article{2019-sensors-nemec, title = {Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks}, author = {Lukas Nemec and Vashek Matyas and Radim Ostadal and Petr Svenda and Pierre-Louis Palant}, journal = {Sensors}, volume = {19}, number = {4}, publisher = {Multidisciplinary Digital Publishing Institute}, year = {2019}, issn = {1424-8220}, doi = {10.3390/s19040914}, url = {http://www.mdpi.com/1424-8220/19/4/914}, keywords = {WSN}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability**</text>\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT//, SciTePress, 2019, 25-36.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:factorization|factorization]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2019-secrypt-sedlacek.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0007786600250036|DOI website]], ++ BibTeX |<code>@Conference{2019-secrypt-sedlacek, title = {I Want to Break Square-free: The 4p−1 Factorization Method and Its RSA Backdoor Viability}, author = {Vladimir Sedlacek and Dusan Klinec and Marek Sys and Petr Svenda and Vashek Matyas}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT}, pages = {25-36}, organization = {INSTICC}, publisher = {SciTePress}, year = {2019}, isbn = {978-989-758-378-0}, doi = {10.5220/0007786600250036}, keywords = {ECC, factorization, smartcards, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/public/papers/Secrypt2019|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem**</text>\\ [[:publications:authors:stefano-calzavara|Stefano Calzavara]], [[:publications:authors:riccardo-focardi|Riccardo Focardi]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:alvise-rabitti|Alvise Rabitti]] and [[:publications:authors:marco-squarcina|Marco Squarcina]],\\ //2019 IEEE Symposium on Security and Privacy (SP)//, IEEE, 2019.\\ [[http://dx.doi.org/10.1109/sp.2019.00053|DOI website]], ++ BibTeX |<code>@InProceedings{2019-sp-calzavara, title = {Postcards from the Post-{HTTP} World: Amplification of {HTTPS} Vulnerabilities in the Web Ecosystem}, author = {Stefano Calzavara and Riccardo Focardi and Matus Nemec and Alvise Rabitti and Marco Squarcina}, booktitle = {2019 {IEEE} Symposium on Security and Privacy ({SP})}, publisher = {IEEE}, year = {2019}, doi = {10.1109/sp.2019.00053}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://secgroup.github.io/tlswebscan/|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Reflective Diary for Professional Development of Novice Teachers**</text>\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:valdemar-svabensky|Valdemar Svabensky]] and [[:publications:authors:jan-nehyba|Jan Nehyba]],\\ //Proceedings of the 50th ACM Technical Symposium on Computer Science Education//, ACM, 2019, 1088--1094.\\ {{:publications:pdf:2019-sigcse-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3287324.3287448|DOI website]], ++ BibTeX |<code>@InProceedings{2019-sigcse-ukrop, title = {Reflective Diary for Professional Development of Novice Teachers}, author = {Martin Ukrop and Valdemar Svabensky and Jan Nehyba}, booktitle = {Proceedings of the 50th ACM Technical Symposium on Computer Science Education}, series = {SIGCSE '19}, pages = {1088--1094}, publisher = {ACM}, address = {New York, NY, USA}, year = {2019}, isbn = {978-1-4503-5890-3}, doi = {10.1145/3287324.3287448}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/sigcse2019|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Will You Trust This TLS Certificate? Perceptions of People Working in IT**</text>\\ [[:publications:authors:martin-ukrop|Martin Ukrop]], [[:publications:authors:lydia-kraus|Lydia Kraus]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:heider-ahmad-mutleq-wahsheh|Heider Ahmad Mutleq Wahsheh]],\\ //Proceedings of the 35rd Annual Computer Security Applications Conference (ACSAC'2019)//, ACM, 2019.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2019-acsac-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3359789.3359800|DOI website]], ++ BibTeX |<code>@InProceedings{2019-acsac-ukrop, title = {Will You Trust This TLS Certificate? Perceptions of People Working in IT}, author = {Martin Ukrop and Lydia Kraus and Vashek Matyas and Heider Ahmad Mutleq Wahsheh}, booktitle = {Proceedings of the 35rd Annual Computer Security Applications Conference (ACSAC'2019)}, publisher = {ACM}, year = {2019}, doi = {10.1145/3359789.3359800}, keywords = {usablesec, Red-Hat}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/acsac2019|Details]]</button> </col></grid> ==== 2018==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**A Large-scale Comparative Study of Beta Testers and Regular Users**</text>\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Communications of the ACM//, ACM, 2018, 64--71.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], {{:publications:pdf:2018-cacm-stavova.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1145/3173570|DOI website]], ++ BibTeX |<code>@Article{2018-cacm-stavova, title = {A Large-scale Comparative Study of Beta Testers and Regular Users}, author = {Vlasta Stavova and Lenka Dedkova and Martin Ukrop and Vashek Matyas}, journal = {Communications of the ACM}, volume = {61}, number = {2}, pages = {64--71}, publisher = {ACM}, year = {2018}, doi = {10.1145/3173570}, keywords = {usablesec, ESET}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/cacm2018|Details]]</button> </col></grid> * <text size="large">**Adaptive Secrecy Amplification with Radio Channel Key Extraction**</text>\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS)//, 2018, 123-130.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1109/DCOSS.2018.00028|DOI website]], ++ BibTeX |<code>@InProceedings{2018-dcoss-nemec, title = {Adaptive Secrecy Amplification with Radio Channel Key Extraction}, author = {Lukas Nemec and Radim Ostadal and Vashek Matyas and Petr Svenda}, booktitle = {2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS)}, pages = {123-130}, year = {2018}, issn = {2325-2944}, doi = {10.1109/DCOSS.2018.00028}, keywords = {WSN}, } </code>++ * <text size="large">**Entropy Crowdsourcing -- Protocols for Link Key Updates in Wireless Sensor Networks**</text>\\ [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Security Protocols Workshop XXVI//, Springer International Publishing, 2018, 84-92.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2018-spw-nemec, title = {Entropy Crowdsourcing -- Protocols for Link Key Updates in Wireless Sensor Networks}, author = {Lukas Nemec and Radim Ostadal and Vashek Matyas and Petr Svenda}, booktitle = {Security Protocols Workshop XXVI}, pages = {84-92}, publisher = {Springer International Publishing}, year = {2018}, isbn = {978-3-030-03251-7}, keywords = {WSN}, } </code>++ * <text size="large">**Evolving Boolean Functions for Fast and Efficient Randomness Testing**</text>\\ [[:publications:authors:vojtech-mrazek|Vojtech Mrazek]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:zdenek-vasicek|Zdenek Vasicek]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vaclav-matyas|Vaclav Matyas]],\\ //Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '18)//, Association for Computing Machinery, 2018, 1302--1309.\\ [[http://dx.doi.org/10.1145/3205455.3205518|DOI website]], ++ BibTeX |<code>@InProceedings{2018-gecco-mrazek, title = {Evolving Boolean Functions for Fast and Efficient Randomness Testing}, author = {Vojtech Mrazek and Marek Sys and Zdenek Vasicek and Lukas Sekanina and Vaclav Matyas}, booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '18)}, pages = {1302--1309}, publisher = {Association for Computing Machinery}, location = {Kyoto, JP}, year = {2018}, isbn = {978-1-4503-5618-3}, doi = {10.1145/3205455.3205518}, } </code>++ * <text size="large">**Experimental large-scale review of attractors for detection of potentially unwanted applications**</text>\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lenka-dedkova|Lenka Dedkova]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:mike-just|Mike Just]], [[:publications:authors:david-smahel|David Smahel]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Computers \& Security//, 2018, 92--100.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1016/j.cose.2018.02.017|DOI website]], [[http://www.sciencedirect.com/science/article/pii/S0167404818301640|paper website]], ++ BibTeX |<code>@Article{2018-compsec-statova, title = {Experimental large-scale review of attractors for detection of potentially unwanted applications}, author = {Vlasta Stavova and Lenka Dedkova and Vashek Matyas and Mike Just and David Smahel and Martin Ukrop}, journal = {Computers \& Security}, volume = {76}, pages = {92--100}, year = {2018}, issn = {0167-4048}, doi = {10.1016/j.cose.2018.02.017}, url = {http://www.sciencedirect.com/science/article/pii/S0167404818301640}, keywords = {usablesec, ESET, GAMU}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Why Johnny the Developer Can't Work with Public Key Certificates: An Experimental Study of OpenSSL Usability**</text>\\ [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Topics in Cryptology -- CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018//, Springer International Publishing, 2018, 45--64.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:red-hat|red-hat]], {{:publications:pdf:2018-rsa-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-319-76953-0_3|DOI website]], ++ BibTeX |<code>@InBook{2018-rsa-ukrop, title = {Why Johnny the Developer Can't Work with Public Key Certificates: An Experimental Study of OpenSSL Usability}, author = {Martin Ukrop and Vashek Matyas}, booktitle = {Topics in Cryptology -- CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018}, pages = {45--64}, publisher = {Springer International Publishing}, year = {2018}, doi = {10.1007/978-3-319-76953-0_3}, keywords = {usablesec, Red-Hat}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/rsa2018|Details]]</button> </col></grid> ==== 2017==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components**</text>\\ [[:publications:authors:vasilios-mavroudis|Vasilios Mavroudis]], [[:publications:authors:andrea-cerulli|Andrea Cerulli]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:dan-cvrcek|Dan Cvrcek]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:george-danezis|George Danezis]],\\ //24th ACM Conference on Computer and Communications Security (CCS'2017)//, ACM, 2017, 1583--1600.\\ Keywords: [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:smpc|smpc]], ++ BibTeX |<code>@InProceedings{2017-ccs-mavroudis, title = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components}, author = {Vasilios Mavroudis and Andrea Cerulli and Petr Svenda and Dan Cvrcek and Dusan Klinec and George Danezis}, booktitle = {24th ACM Conference on Computer and Communications Security (CCS'2017)}, pages = {1583--1600}, publisher = {ACM}, year = {2017}, isbn = {978-1-4503-4946-8/17/10}, keywords = {smartcards, SMPC}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/mpc_ccs17|Details]]</button> </col></grid> * <text size="large">**Factors Influencing the Purchase of Security Software for Mobile Devices -- Case Study**</text>\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:mike-just|Mike Just]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //Infocommunications Journal//, 2017, 18--23.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], {{:publications:pdf:2017-infocomm-stavova.pdf|pre-print PDF}}, [[http://www.infocommunications.hu/2017_1|paper website]], ++ BibTeX |<code>@Article{2017-infocomm-stavova, title = {Factors Influencing the Purchase of Security Software for Mobile Devices -- Case Study}, author = {Vlasta Stavova and Vashek Matyas and Mike Just and Martin Ukrop}, journal = {Infocommunications Journal}, volume = {9}, issue = {1}, pages = {18--23}, year = {2017}, url = {http://www.infocommunications.hu/2017_1}, keywords = {usablesec, ESET, GAMU}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans**</text>\\ [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:peter-sekan|Peter Sekan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)//, ACM, 2017.\\ Keywords: [[:publications:keywords:cryptolibs|cryptolibs]], [[:publications:keywords:rsa|rsa]], [[:publications:keywords:fingerprinting|fingerprinting]], [[:publications:keywords:smartcard|smartcard]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.1145/3134600.3134612|DOI website]], ++ BibTeX |<code>@InProceedings{2017-acsac-nemec, title = {Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans}, author = {Matus Nemec and Dusan Klinec and Petr Svenda and Peter Sekan and Vashek Matyas}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)}, publisher = {ACM}, year = {2017}, doi = {10.1145/3134600.3134612}, keywords = {cryptolibs, RSA, fingerprinting, smartcard, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/acsac2017|Details]]</button> </col></grid> * <text size="large">**The Efficient Randomness Testing using Boolean Functions**</text>\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //The 14th International Conference on Security and Cryptography (Secrypt'2017)//, SCITEPRESS, 2017, 92--103.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], ++ BibTeX |<code>@InProceedings{2017-secrypt-sys, title = {The Efficient Randomness Testing using Boolean Functions}, author = {Marek Sys and Dusan Klinec and Petr Svenda}, booktitle = {The 14th International Conference on Security and Cryptography (Secrypt'2017)}, pages = {92--103}, publisher = {SCITEPRESS}, year = {2017}, isbn = {978-989-758-259-2}, keywords = {eacirc, randomness}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli**</text>\\ [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:dusan-klinec|Dusan Klinec]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //24th ACM Conference on Computer and Communications Security (CCS'2017)//, ACM, 2017, 1631--1648.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], ++ BibTeX |<code>@InProceedings{2017-ccs-nemec, title = {The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli}, author = {Matus Nemec and Marek Sys and Petr Svenda and Dusan Klinec and Vashek Matyas}, booktitle = {24th ACM Conference on Computer and Communications Security (CCS'2017)}, pages = {1631--1648}, publisher = {ACM}, year = {2017}, isbn = {978-1-4503-4946-8/17/10}, keywords = {RSA, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://crocs.fi.muni.cz/papers/rsa_ccs17|Details]]</button> </col></grid> ==== 2016==== * <text size="large">**Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm**</text>\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //ACM Transactions on Mathematicsl Software//, ACM, 2016, 27:1--27:11.\\ Keywords: [[:publications:keywords:randomness|randomness]], [[http://dx.doi.org/10.1145/2988228|DOI website]], ++ BibTeX |<code>@Article{2016-toms-sys, title = {{Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm}}, author = {Marek Sys and Zdenek Riha and Vashek Matyas}, journal = {ACM Transactions on Mathematicsl Software}, volume = {43}, number = {3}, pages = {27:1--27:11}, publisher = {ACM}, year = {2016}, issn = {0098-3500}, doi = {10.1145/2988228}, keywords = {randomness}, } </code>++ * <text size="large">**Attack Detection Using Evolutionary Computation**</text>\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:andriy-stetsko|Andriy Stetsko]],\\ //Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges//, Springer series on Studies in Computational Intelligence, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InCollection{2016-ciwsn-stehlik, title = {Attack Detection Using Evolutionary Computation}, author = {Martin Stehlik and Vashek Matyas and Andriy Stetsko}, booktitle = {Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges}, publisher = {Springer series on Studies in Computational Intelligence}, year = {2016}, keywords = {WSN}, } </code>++ * <text size="large">**Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping -- Secrecy Amplification Case**</text>\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //International Conference on Cryptology and Network Security (CANS 2016)//, Springer, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2016-cans-ostadal, title = {Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping -- Secrecy Amplification Case}, author = {Radim Ostadal and Petr Svenda and Vashek Matyas}, booktitle = {International Conference on Cryptology and Network Security (CANS 2016)}, publisher = {Springer}, year = {2016}, keywords = {WSN}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Avalanche Effect in Improperly Initialized CAESAR Candidates**</text>\\ [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016//, Open Publishing Association, 2016, volume 233 of Electronic Proceedings in Theoretical Computer Science, 72-81.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2016-memics-ukrop.pdf|pre-print PDF}}, [[http://dx.doi.org/10.4204/EPTCS.233.7|DOI website]], ++ BibTeX |<code>@InProceedings{2016-memics-ukrop, title = {Avalanche Effect in Improperly Initialized CAESAR Candidates}, author = {Martin Ukrop and Petr Svenda}, booktitle = {Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016}, series = {Electronic Proceedings in Theoretical Computer Science}, volume = {233}, pages = {72-81}, publisher = {Open Publishing Association}, year = {2016}, doi = {10.4204/EPTCS.233.7}, keywords = {eacirc, randomness}, editor = {Bouda, Jan and Holík, Lukáš and Kofroň, Jan and Strejček, Jan and Rambousek, Adam}, eventtitle = {MEMICS}, eventdate = {October 23--25, 2016}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[http://crcs.cz/papers/memics2016|Details]]</button> </col></grid> * <text size="large">**Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms**</text>\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:mike-just|Mike Just]],\\ //IFIP International Conference on Information Security Theory and Practice//, 2016, 35--50.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:sodatsw|sodatsw]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1007/978-3-319-45931-8_3|DOI website]], ++ BibTeX |<code>@InProceedings{2016-wistp-stavova, title = {Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms}, author = {Vlasta Stavova and Vashek Matyas and Mike Just}, booktitle = {IFIP International Conference on Information Security Theory and Practice}, pages = {35--50}, organization = {Springer}, year = {2016}, doi = {10.1007/978-3-319-45931-8_3}, keywords = {usablesec, SODATSW, GAMU}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**New results on reduced-round Tiny Encryption Algorithm using genetic programming**</text>\\ [[:publications:authors:karel-kubicek|Karel Kubicek]], [[:publications:authors:jiri-novotny|Jiri Novotny]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:martin-ukrop|Martin Ukrop]],\\ //IEEE Infocommunications//, 2016.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2016-infocommunications-kubicek.pdf|pre-print PDF}}, [[http://www.infocommunications.hu/2016_1|paper website]], ++ BibTeX |<code>@Article{2016-infocommunications-kubicek, title = {New results on reduced-round Tiny Encryption Algorithm using genetic programming}, author = {Karel Kubicek and Jiri Novotny and Petr Svenda and Martin Ukrop}, journal = {IEEE Infocommunications}, volume = {8}, issue = {1}, year = {2016}, url = {http://www.infocommunications.hu/2016_1}, keywords = {eacirc, randomness}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[http://crcs.cz/papers/infocomm2016|Details]]</button> </col></grid> * <text size="large">**On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications**</text>\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:mike-just|Mike Just]],\\ //Euro Usable Security (EuroUSEC) Workshop Programme//, 2016.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:pua|pua]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.14722/eurousec.2016.23003|DOI website]], ++ BibTeX |<code>@InProceedings{2016-eurousec-stavova, title = {On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications}, author = {Vlasta Stavova and Vashek Matyas and Mike Just}, booktitle = {Euro Usable Security (EuroUSEC) Workshop Programme}, organization = {Internet Society}, year = {2016}, doi = {10.14722/eurousec.2016.23003}, keywords = {usablesec, ESET, PUA, GAMU}, } </code>++ * <text size="large">**Randomness Testing: Result Interpretation and Speed**</text>\\ [[:publications:authors:sys--marek|Sys, Marek]] and [[:publications:authors:matyas--vashek|Matyas, Vashek]],\\ //The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday//, Springer Berlin Heidelberg, 2016, 389--395.\\ [[http://dx.doi.org/10.1007/978-3-662-49301-4_24|DOI website]], [[https://doi.org/10.1007/978-3-662-49301-4_24|paper website]], ++ BibTeX |<code>@InBook{2016-newcode-sys, title = {Randomness Testing: Result Interpretation and Speed}, author = {Sys, Marek and Matyas, Vashek}, booktitle = {The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, pages = {389--395}, publisher = {Springer Berlin Heidelberg}, address = {Berlin, Heidelberg}, year = {2016}, isbn = {978-3-662-49301-4}, doi = {10.1007/978-3-662-49301-4_24}, url = {https://doi.org/10.1007/978-3-662-49301-4_24}, editor = {Ryan, Peter Y. A. and Naccache, David and Quisquater, Jean-Jacques}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Reconsidering Attacker Models in Ad-hoc Networks**</text>\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //24th International Workshop on Security Protocols (SPW 2016)//, Springer, 2016.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2016-spw-ostadal, title = {Reconsidering Attacker Models in Ad-hoc Networks}, author = {Radim Ostadal and Petr Svenda and Vashek Matyas}, booktitle = {24th International Workshop on Security Protocols (SPW 2016)}, publisher = {Springer}, year = {2016}, keywords = {WSN}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[http://crcs.cz/papers/spw2016|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**The Million-Key Question -- Investigating the Origins of RSA Public Keys**</text>\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:peter-sekan|Peter Sekan]], [[:publications:authors:rudolf-kvasnovsky|Rudolf Kvasnovsky]], [[:publications:authors:david-formanek|David Formanek]], [[:publications:authors:david-komarek|David Komarek]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //FI MU Report Series, FIMU-RS-2016-03//, Masaryk University, 2016, 1--83.\\ Keywords: [[:publications:keywords:rsa|rsa]], ++ BibTeX |<code>@InProceedings{2016-fimunitr201603-svenda, title = {The Million-Key Question -- Investigating the Origins of RSA Public Keys}, author = {Petr Svenda and Matus Nemec and Peter Sekan and Rudolf Kvasnovsky and David Formanek and David Komarek and Vashek Matyas}, booktitle = {FI MU Report Series, FIMU-RS-2016-03}, pages = {1--83}, publisher = {Masaryk University}, year = {2016}, keywords = {RSA}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[http://crcs.cz/rsa|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**The Million-Key Question -- Investigating the Origins of RSA Public Keys**</text>\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:matus-nemec|Matus Nemec]], [[:publications:authors:peter-sekan|Peter Sekan]], [[:publications:authors:rudolf-kvasnovsky|Rudolf Kvasnovsky]], [[:publications:authors:david-formanek|David Formanek]], [[:publications:authors:david-komarek|David Komarek]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //The 25th USENIX Security Symposium (UsenixSec'2016)//, USENIX, 2016, 893--910.\\ Keywords: [[:publications:keywords:rsa|rsa]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], {{:publications:pdf:2016-usenixsec-svenda.pdf|pre-print PDF}}, ++ BibTeX |<code>@InProceedings{2016-usenixsec-svenda, title = {The Million-Key Question -- Investigating the Origins of RSA Public Keys}, author = {Petr Svenda and Matus Nemec and Peter Sekan and Rudolf Kvasnovsky and David Formanek and David Komarek and Vashek Matyas}, booktitle = {The 25th USENIX Security Symposium (UsenixSec'2016)}, pages = {893--910}, publisher = {USENIX}, year = {2016}, isbn = {978-1-931971-32-4}, keywords = {RSA, cryptoimplementations}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[http://crcs.cz/rsa|Details]]</button> </col></grid> * <text size="large">**Towards better selective forwarding and delay attacks detection in wireless sensor networks**</text>\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:andriy-stetsko|Andriy Stetsko]],\\ //2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)//, 2016, 1-6.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1109/ICNSC.2016.7478978|DOI website]], ++ BibTeX |<code>@InProceedings{2016-icnsc-stehlik, title = {Towards better selective forwarding and delay attacks detection in wireless sensor networks}, author = {Martin Stehlik and Vashek Matyas and Andriy Stetsko}, booktitle = {2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)}, pages = {1-6}, year = {2016}, doi = {10.1109/ICNSC.2016.7478978}, keywords = {WSN}, } </code>++ ==== 2015==== <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Architecture Considerations for Massively Parallel Hardware Security Platform**</text>\\ [[:publications:authors:dan-cvrcek|Dan Cvrcek]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //The 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE--2015), LNCS 9354//, Springer, 2015, 269--288.\\ [[http://dx.doi.org/10.1007/978-3-319-24126-5_16|DOI website]], ++ BibTeX |<code>@InProceedings{2015-space-cvrcek, title = {Architecture Considerations for Massively Parallel Hardware Security Platform}, author = {Dan Cvrcek and Petr Svenda}, booktitle = {The 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE--2015), LNCS 9354}, pages = {269--288}, publisher = {Springer}, year = {2015}, doi = {10.1007/978-3-319-24126-5_16}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[http://crcs.cz/papers/space2015|Details]]</button> </col></grid> * <text size="large">**Challenges of fiction in network security -- perspective of virtualized environments**</text>\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:tatevik-baghdasaryan|Tatevik Baghdasaryan]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Cambridge International Workshop on Security Protocols//, Springer, 2015.\\ ++ BibTeX |<code>@InProceedings{2015-spw-bukac, title = {Challenges of fiction in network security -- perspective of virtualized environments}, author = {Vit Bukac and Radim Ostadal and Petr Svenda and Tatevik Baghdasaryan and Vashek Matyas}, booktitle = {Cambridge International Workshop on Security Protocols}, publisher = {Springer}, year = {2015}, } </code>++ * <text size="large">**DDoSaaS: DDoS jako služba**</text>\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //IS2: From trends to solutions//, Tate International, 2015, 35-39.\\ Keywords: [[:publications:keywords:ddosaas|ddosaas]], ++ BibTeX |<code>@InProceedings{2015-is2-bukac, title = {DDoSaaS: DDoS jako služba}, author = {Vit Bukac and Vlasta Stavova and Lukas Nemec and Zdenek Riha and Vashek Matyas}, booktitle = {IS2: From trends to solutions}, pages = {35-39}, publisher = {Tate International}, address = {Praha}, location = {Praha}, year = {2015}, isbn = {978-80-86813-28-8}, keywords = {ddosaas}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**On Secrecy Amplification Protocols**</text>\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //The 9th WISTP International Conference on Information Security Theory and Practice (WISTP--2015), LNCS 9311//, Springer, 2015, 3--19.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-24018-3 1|DOI website]], ++ BibTeX |<code>@InProceedings{2015-wistp-ostadal, title = {On Secrecy Amplification Protocols}, author = {Radim Ostadal and Petr Svenda and Vashek Matyas}, booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP--2015), LNCS 9311}, pages = {3--19}, publisher = {Springer}, year = {2015}, doi = {10.1007/978-3-319-24018-3 1}, keywords = {WSN}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[http://crcs.cz/papers/wistp2015|Details]]</button> </col></grid> * <text size="large">**Service in Denial – Clouds Going with the Winds**</text>\\ [[:publications:authors:vit-bukac|Vit Bukac]], [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:lukas-nemec|Lukas Nemec]], [[:publications:authors:zdenek-riha|Zdenek Riha]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 9th International Conference on Network and System Security//, Springer International Publishing, 2015, 130-143.\\ Keywords: [[:publications:keywords:ddosaas|ddosaas]], [[http://dx.doi.org/10.1007/978-3-319-25645-0_9|DOI website]], [[http://dx.doi.org/10.1007/978-3-319-25645-0_9|paper website]], ++ BibTeX |<code>@InBook{2015-nss-bukac, title = {Service in Denial – Clouds Going with the Winds}, author = {Vit Bukac and Vlasta Stavova and Lukas Nemec and Zdenek Riha and Vashek Matyas}, booktitle = {Proceedings of the 9th International Conference on Network and System Security}, pages = {130-143}, publisher = {Springer International Publishing}, year = {2015}, isbn = {978-3-319-25645-0}, doi = {10.1007/978-3-319-25645-0_9}, url = {http://dx.doi.org/10.1007/978-3-319-25645-0_9}, keywords = {ddosaas}, } </code>++ * <text size="large">**The challenge of increasing safe response of antivirus software users**</text>\\ [[:publications:authors:vlasta-stavova|Vlasta Stavova]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:kamil-malinka|Kamil Malinka]],\\ //International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science//, 2015, 133--143.\\ Keywords: [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:eset|eset]], [[:publications:keywords:gamu|gamu]], [[http://dx.doi.org/10.1007/978-3-319-29817-7_12|DOI website]], ++ BibTeX |<code>@InProceedings{2015-memics-stavova, title = {The challenge of increasing safe response of antivirus software users}, author = {Vlasta Stavova and Vashek Matyas and Kamil Malinka}, booktitle = {International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science}, pages = {133--143}, organization = {Springer}, year = {2015}, doi = {10.1007/978-3-319-29817-7_12}, keywords = {usablesec, ESET, GAMU}, } </code>++ * <text size="large">**WSNProtectLayer: Security Middleware for Wireless Sensor Networks**</text>\\ [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:dusan-klinec|Dusan Klinec]], [[:publications:authors:filip-jurnecka|Filip Jurnecka]] and [[:publications:authors:martin-stehlik|Martin Stehlik]],\\ //Securing Cyber-Physical Systems//, CRC Press, 2015, 119-162.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1201/b19311-6|DOI website]], ++ BibTeX |<code>@InCollection{2015-scps-matyas, title = {{WSNProtectLayer: Security Middleware for Wireless Sensor Networks}}, author = {Vashek Matyas and Petr Svenda and Andriy Stetsko and Dusan Klinec and Filip Jurnecka and Martin Stehlik}, booktitle = {Securing Cyber-Physical Systems}, pages = {119-162}, publisher = {CRC Press}, year = {2015}, isbn = {978-1-4987-0098-6}, doi = {10.1201/b19311-6}, keywords = {WSN}, } </code>++ ==== 2014==== * <text size="large">**A New Approach to SA in Partially Compromised Networks**</text>\\ [[:publications:authors:radim-ostadal|Radim Ostadal]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security, Privacy, and Applied Cryptography Engineering -- 4th Int. Conf., SPACE 2014, LNCS 8804//, Springer, 2014.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2014-space-ostadal, title = {A New Approach to SA in Partially Compromised Networks}, author = {Radim Ostadal and Petr Svenda and Vashek Matyas}, booktitle = {Security, Privacy, and Applied Cryptography Engineering -- 4th Int. Conf., SPACE 2014, LNCS 8804}, publisher = {Springer}, year = {2014}, keywords = {WSN}, } </code>++ * <text size="large">**Constructing empirical tests of randomness**</text>\\ [[:publications:authors:marek-sys|Marek Sys]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 11th International Conference on Security and Cryptography//, 2014.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2014-secrypt-sys.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0005023902290237|DOI website]], ++ BibTeX |<code>@InProceedings{2014-secrypt-sys, title = {Constructing empirical tests of randomness}, author = {Marek Sys and Petr Svenda and Martin Ukrop and Vashek Matyas}, booktitle = {Proceedings of the 11th International Conference on Security and Cryptography}, year = {2014}, doi = {10.5220/0005023902290237}, keywords = {eacirc, randomness}, eventtitle = {ICETE}, } </code>++ * <text size="large">**Constructing empirical tests of randomness**</text>\\ [[:publications:authors:sys--marek|Sys, Marek]], [[:publications:authors:svenda--petr|Svenda, Petr]], [[:publications:authors:ukrop--martin|Ukrop, Martin]] and [[:publications:authors:matyas--vashek|Matyas, Vashek]],\\ //2014 11th International Conference on Security and Cryptography (SECRYPT)//, 2014, 1--9.\\ {{:publications:pdf:2014-secrypt-sys.pdf|pre-print PDF}}, ++ BibTeX |<code>@InProceedings{2014-secrypt-sys, title = {Constructing empirical tests of randomness}, author = {Sys, Marek and Svenda, Petr and Ukrop, Martin and Matyas, Vashek}, booktitle = {2014 11th International Conference on Security and Cryptography (SECRYPT)}, pages = {1--9}, organization = {IEEE}, year = {2014}, } </code>++ * <text size="large">**Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits**</text>\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //E-Business and Telecommunications//, Springer Berlin Heidelberg, 2014, 290--305.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2014-ccis-svenda.pdf|pre-print PDF}}, [[http://dx.doi.org/10.1007/978-3-662-44788-8_17|DOI website]], ++ BibTeX |<code>@InCollection{2014-ccis-svenda, title = {Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits}, author = {Petr Svenda and Martin Ukrop and Vashek Matyas}, booktitle = {E-Business and Telecommunications}, volume = {456}, pages = {290--305}, publisher = {Springer Berlin Heidelberg}, year = {2014}, doi = {10.1007/978-3-662-44788-8_17}, keywords = {eacirc, randomness}, } </code>++ * <text size="large">**Evaluation of key management schemes in wireless sensor networks**</text>\\ [[:publications:authors:filip-jurnecka|Filip Jurnecka]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security and Trust Management//, Springer International Publishing, 2014, 198-203.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-11851-2_16|DOI website]], [[http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16|paper website]], ++ BibTeX |<code>@InProceedings{2014-stm-jurnecka, title = {Evaluation of key management schemes in wireless sensor networks}, author = {Filip Jurnecka and Martin Stehlik and Vashek Matyas}, booktitle = {Security and Trust Management}, pages = {198-203}, publisher = {Springer International Publishing}, address = {Switzerland}, year = {2014}, isbn = {978-3-319-11850-5}, doi = {10.1007/978-3-319-11851-2_16}, url = {http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16}, keywords = {WSN}, } </code>++ * <text size="large">**Faster Randomness Testing with the NIST Statistical Test Suite**</text>\\ [[:publications:authors:sys--marek|Sys, Marek]] and [[:publications:authors:riha--zdenek|Riha, Zdenek]],\\ //International Conference on Security, Privacy, and Applied Cryptography Engineering//, 2014, 272--284.\\ ++ BibTeX |<code>@InProceedings{2014-space-sys, title = {Faster Randomness Testing with the NIST Statistical Test Suite}, author = {Sys, Marek and Riha, Zdenek}, booktitle = {International Conference on Security, Privacy, and Applied Cryptography Engineering}, pages = {272--284}, organization = {Springer}, year = {2014}, } </code>++ * <text size="large">**Improving Intrusion Detection Systems for Wireless Sensor Networks**</text>\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:tobias-smolka|Tobias Smolka]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:martin-stehlik|Martin Stehlik]],\\ //Applied Cryptography and Network Security//, Springer International Publishing, 2014, volume 8479 of Lecture Notes in Computer Science, 343-360.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-07536-5_21|DOI website]], ++ BibTeX |<code>@InCollection{2014-ssms-stetsko, title = {Improving Intrusion Detection Systems for Wireless Sensor Networks}, author = {Andriy Stetsko and Tobias Smolka and Vashek Matyas and Martin Stehlik}, booktitle = {Applied Cryptography and Network Security}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {343-360}, publisher = {Springer International Publishing}, year = {2014}, isbn = {978-3-319-07535-8}, doi = {10.1007/978-3-319-07536-5_21}, keywords = {WSN}, } </code>++ * <text size="large">**On Node Capturing Attacker Strategies**</text>\\ [[:publications:authors:filip-jurnecka|Filip Jurnecka]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers//, Springer LNCS, 2014, 300-315.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-12400-1_29|DOI website]], ++ BibTeX |<code>@InProceedings{2014-spw-jurnecka, title = {On Node Capturing Attacker Strategies}, author = {Filip Jurnecka and Martin Stehlik and Vashek Matyas}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers}, pages = {300-315}, publisher = {Springer LNCS}, year = {2014}, doi = {10.1007/978-3-319-12400-1_29}, keywords = {WSN}, } </code>++ ==== 2013==== * <text size="large">**Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks**</text>\\ [[:publications:authors:martin-stehlik|Martin Stehlik]], [[:publications:authors:adam-saleh|Adam Saleh]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems//, MIT Press, 2013, 569-576.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://mitpress.mit.edu/sites/default/files/titles/content/ecal13/ch082.html|paper website]], ++ BibTeX |<code>@InProceedings{2013-sssm-stehlik, title = {Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks}, author = {Martin Stehlik and Adam Saleh and Andriy Stetsko and Vashek Matyas}, booktitle = {Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems}, pages = {569-576}, publisher = {MIT Press}, address = {Cambridge, MA 02142-1493 USA}, year = {2013}, isbn = {978-0-262-31709-2}, url = {http://mitpress.mit.edu/sites/default/files/titles/content/ecal13/ch082.html}, keywords = {WSN}, } </code>++ * <text size="large">**On the origin of yet another channel**</text>\\ [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ Springer, 2013.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], {{:publications:pdf:2013-spw-svenda.pdf|pre-print PDF}}, ++ BibTeX |<code>@InProceedings{2013-spw-svenda, title = {On the origin of yet another channel}, author = {Petr Svenda and Vashek Matyas}, organization = {Faculty of Informatics Masaryk University}, publisher = {Springer}, year = {2013}, keywords = {eacirc}, eventtitle = {Twenty-first International Workshop on Security Protocols}, eventdate = {2013-03-19}, } </code>++ * <text size="large">**Towards cryptographic function distinguishers with evolutionary circuits**</text>\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:martin-ukrop|Martin Ukrop]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 10th International Conference on Security and Cryptography//, 2013, 135--146.\\ Keywords: [[:publications:keywords:eacirc|eacirc]], [[:publications:keywords:randomness|randomness]], {{:publications:pdf:2013-secrypt-svenda.pdf|pre-print PDF}}, [[http://dx.doi.org/10.5220/0004524001350146|DOI website]], ++ BibTeX |<code>@InProceedings{2013-secrypt-svenda, title = {Towards cryptographic function distinguishers with evolutionary circuits}, author = {Petr Svenda and Martin Ukrop and Vashek Matyas}, booktitle = {Proceedings of the 10th International Conference on Security and Cryptography}, pages = {135--146}, year = {2013}, doi = {10.5220/0004524001350146}, keywords = {eacirc, randomness}, eventtitle = {ICETE}, } </code>++ ==== 2012==== * <text size="large">**Evolutionary Design of Message Efficient Secrecy Amplification Protocols**</text>\\ [[:publications:authors:tobias-smolka|Tobias Smolka]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Genetic Programming//, Berlin: Springer Verlag, 2012, 194--205.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2012-gp-smolka, title = {Evolutionary Design of Message Efficient Secrecy Amplification Protocols}, author = {Tobias Smolka and Petr Svenda and Lukas Sekanina and Vashek Matyas}, booktitle = {Genetic Programming}, pages = {194--205}, publisher = {Berlin: Springer Verlag}, year = {2012}, keywords = {WSN}, } </code>++ * <text size="large">**Two improvements of random key predistribution for wireless sensor networks**</text>\\ [[:publications:authors:jiri-kur|Jiri Kur]], [[:publications:authors:vashek-matyas|Vashek Matyas]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //International Conference on Security and Privacy in Communication Systems//, 2012, 61--75.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2014-securecomm-kur, title = {Two improvements of random key predistribution for wireless sensor networks}, author = {Jiri Kur and Vashek Matyas and Petr Svenda}, booktitle = {International Conference on Security and Privacy in Communication Systems}, pages = {61--75}, organization = {Springer}, year = {2012}, keywords = {WSN}, } </code>++ ==== 2011==== * <text size="large">**Attack detection vs. privacy--How to find the link or how to hide it?**</text>\\ [[:publications:authors:jiri-kur|Jiri Kur]], [[:publications:authors:vashek-matyas|Vashek Matyas]], [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:petr-svenda|Petr Svenda]],\\ //International Workshop on Security Protocols//, 2011, 189--199.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2011-spw-kur, title = {Attack detection vs. privacy--How to find the link or how to hide it?}, author = {Jiri Kur and Vashek Matyas and Andriy Stetsko and Petr Svenda}, booktitle = {International Workshop on Security Protocols}, pages = {189--199}, organization = {Springer}, year = {2011}, keywords = {WSN}, } </code>++ * <text size="large">**Calibrating and Comparing Simulators for Wireless Sensor Networks**</text>\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the 8\superscriptth IEEE International Conference on Mobile Adhoc and Sensor Systems//, IEEE Computer Society, 2011, 733-738.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2011-ssm-stetsko, title = {Calibrating and Comparing Simulators for Wireless Sensor Networks}, author = {Andriy Stetsko and Martin Stehlik and Vashek Matyas}, booktitle = {Proceedings of the 8\superscript{th} IEEE International Conference on Mobile Adhoc and Sensor Systems}, series = {MASS '11}, pages = {733-738}, publisher = {{IEEE} Computer Society}, address = {Los Alamitos, CA, USA}, year = {2011}, isbn = {978-0-7695-4469-4}, keywords = {WSN}, } </code>++ ==== 2009==== * <text size="large">**Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks**</text>\\ [[:publications:authors:andriy-stetsko|Andriy Stetsko]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //EC2ND 2009 -- European Conference on Computer Network Defense//, IEEE Computer Society, 2009, 21-28.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2009-ec2nd-stetsko, title = {Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks}, author = {Andriy Stetsko and Vashek Matyas}, booktitle = {EC2ND 2009 -- European Conference on Computer Network Defense}, pages = {21-28}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, year = {2009}, isbn = {978-0-7695-3983-6}, keywords = {WSN}, } </code>++ * <text size="large">**Evolutionary design of secrecy amplification protocols for wireless sensor networks**</text>\\ [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:lukas-sekanina|Lukas Sekanina]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Proceedings of the second ACM Conference on Wireless Network Security//, 2009, 225--236.\\ Keywords: [[:publications:keywords:wsn|wsn]], ++ BibTeX |<code>@InProceedings{2009-cwsn-svenda, title = {Evolutionary design of secrecy amplification protocols for wireless sensor networks}, author = {Petr Svenda and Lukas Sekanina and Vashek Matyas}, booktitle = {Proceedings of the second {ACM} Conference on Wireless Network Security}, pages = {225--236}, year = {2009}, keywords = {WSN}, } </code>++