Jan Jancar

Orcid: 0000-0002-1864-0183

According to our database1, Jan Jancar authored at least 15 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
ECTester: Reverse-engineering side-channel countermeasures of ECC implementations.
IACR Cryptol. ePrint Arch., 2025

Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code.
IACR Cryptol. ePrint Arch., 2025

Revisiting the analysis of references among Common Criteria certified products.
Comput. Secur., 2025

2024
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

sec-certs: Examining the security certification practice for better vulnerability mitigation.
Comput. Secur., 2024

"These results must be false": A usability evaluation of constant-time analysis tools.
Proceedings of the 33rd USENIX Security Symposium, 2024

Chain of Trust: Unraveling References Among Common Criteria Certified Products.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
IACR Cryptol. ePrint Arch., 2023

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021

A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Minerva: The curse of ECDSA nonces.
IACR Cryptol. ePrint Arch., 2020

Fooling Primality Tests on Smartcards.
Proceedings of the Computer Security - ESORICS 2020, 2020


  Loading...