关注
Pavol Zajac
Pavol Zajac
在 stuba.sk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A reaction attack on the QC-LDPC McEliece cryptosystem
T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017
722017
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac
Electronics 10 (21), 2647, 2021
542021
On the security of a realization of cryptosystem MST3
S Magliveras, P Svaba, T van Trung, P Zajac
Tatra Mt. Math. Publ 41, 65-78, 2008
47*2008
Overview of the Mceliece Cryptosystem and its Security
M Repka, P Zajac
Tatra Mountains Mathematical Publications 60 (1), 57-83, 2014
422014
Discrete logarithm problem in degree six finite fields
P Zajac
Ph. D. thesis, Slovak University of Technology, 2008
252008
A Reaction Attack on LEDApkc.
T Fabsic, V Hromada, P Zajac
CBC 2018, April 5 & 6, 2018, Davie, Florida, 2018
172018
Multiplicative complexity of bijective 4× 4 S-boxes
P Zajac, M Jókay
Cryptography and Communications 6 (3), 255-277, 2014
162014
A new method to solve MRHS equation systems and its connection to group factorization
P Zajac
Journal of Mathematical Cryptology 7 (4), 367–381, 2013
162013
On the use of the lattice sieve in the 3D NFS
P Zajac
Tatra Mountains Mathematical Publications 45 (1), 161-172, 2010
162010
Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
P Zajac
Designs, Codes and Cryptography 82, 43-56, 2017
122017
Side channel attack on multiprecision multiplier used in protected ECDSA implementation
M Varchola, M Drutarovsky, M Repka, P Zajac
2015 International Conference on ReConFigurable Computing and FPGAs …, 2015
122015
Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications
P Zajac
Sensors 21 (6), 2036, 2021
112021
Local reduction and the algebraic cryptanalysis of the block cipher GOST
P Zajac, R Čagala
Periodica Mathematica Hungarica 65 (2), 239-255, 2012
102012
HCPortal overview
E Antal, P Zajac
Proceedings of the 3rd International Conference on Historical Cryptology …, 2020
92020
Solving trivium-based Boolean equations using the method of syllogisms
P Zajac
Fundamenta Informaticae 114 (3-4), 359-373, 2012
92012
On the use of the method of syllogisms in algebraic cryptanalysis
P Zajac
Proceedings of the 1st Plenary Conference of the NIL-I-004, University of …, 2009
92009
Algorithm for Generating S-Boxes with Prescribed Differential Properties
S Marochok, P Zajac
Algorithms 16 (3), 157, 2023
82023
MRHS solver based on linear algebra and exhaustive search
H Raddum, P Zajac
Journal of Mathematical Cryptology 12 (3), 143-157, 2018
82018
Remarks on the NFS complexity
P Zajac
Tatra Mt. Math. Publ 41, 79-91, 2008
8*2008
Using SAT solvers in large scale distributed algebraic attacks against low entropy keys
V Hromada, L Öllős, P Zajac
Tatra Mountains Mathematical Publications 64 (1), 187-203, 2015
72015
系统目前无法执行此操作,请稍后再试。
文章 1–20