Petr Svenda

Orcid: 0000-0002-9784-7624

According to our database1, Petr Svenda authored at least 52 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
sec-certs: Examining the security certification practice for better vulnerability mitigation.
CoRR, 2023

Secure Cloud Storage System for Digital Evidence.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

The Adoption Rate of JavaCard Features by Certified Products and Open-Source Projects.
Proceedings of the Smart Card Research and Advanced Applications, 2023

Enabling Efficient Threshold Signature Computation via Java Card API.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

A Decentralised Public Key Infrastructure for X-Road.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
JCAlgTest: Robust Identification Metadata for Certified Smartcards.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
Practical approach to re-securing compromised wireless sensor networks.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

2020
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Fooling primality tests on smartcards.
IACR Cryptol. ePrint Arch., 2020

Minerva: The curse of ECDSA nonces.
IACR Cryptol. ePrint Arch., 2020

JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Efficient On-Chip Randomness Testing Utilizing Machine Learning Techniques.
IEEE Trans. Very Large Scale Integr. Syst., 2019

Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification.
Sensors, 2019

Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks.
Sensors, 2019

I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor Viability.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Towards Low-level Cryptographic Primitives for JavaCards.
CoRR, 2018

Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks.
Proceedings of the Security Protocols XXVI, 2018

Adaptive Secrecy Amplification with Radio Channel Key Extraction.
Proceedings of the 14th International Conference on Distributed Computing in Sensor Systems, 2018

2017
The Efficient Randomness Testing using Boolean Functions.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Avalanche Effect in Improperly Initialized CAESAR Candidates.
Proceedings of the Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, 2016

The Million-Key Question - Investigating the Origins of RSA Public Keys.
Proceedings of the 25th USENIX Security Symposium, 2016

Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

Reconsidering Attacker Models in Ad-Hoc Networks.
Proceedings of the Security Protocols XXIV, 2016

Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
On Secrecy Amplification Protocols.
Proceedings of the Information Security Theory and Practice, 2015

Challenges of Fiction in Network Security - Perspective of Virtualized Environments.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a Service.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

2014
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper).
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Constructing Empirical Tests of Randomness.
Proceedings of the SECRYPT 2014, 2014

2013
On the Origin of Yet another Channel.
Proceedings of the Security Protocols XXI, 2013

On the Origin of Yet another Channel (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Towards Cryptographic Function Distinguishers with Evolutionary Circuits.
Proceedings of the SECRYPT 2013, 2013

Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

2012
Two Improvements of Random Key Predistribution for Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2012

Evolutionary Design of Message Efficient Secrecy Amplification Protocols.
Proceedings of the Genetic Programming - 15th European Conference, 2012

2011
Attack Detection vs. Privacy - How to Find the Link or How to Hide It?
Proceedings of the Security Protocols XIX, 2011

2009
Security and Robustness of Wireless Sensor Networks.
ERCIM News, 2009

Evolutionary design of secrecy amplification protocols for wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Evolutionary Design of Attack Strategies.
Proceedings of the Security Protocols XVII, 2009

Evolutionary Design of Attack Strategies.
Proceedings of the Security Protocols XVII, 2009

Secure Logging of Retained Data for an Anonymity Service.
Proceedings of the Privacy and Identity Management for Life, 2009

Towards True Random Number Generation in Mobile Environments.
Proceedings of the Identity and Privacy in the Internet Age, 2009

2007
Authenticated key exchange with group support for wireless sensor networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

2005
Smart Dust Security - Key Infection Revisited.
Proceedings of the First International Workshop on Security and Trust Management, 2005


  Loading...