A reaction attack on the QC-LDPC McEliece cryptosystem T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017 | 72 | 2017 |
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac Electronics 10 (21), 2647, 2021 | 54 | 2021 |
On the security of a realization of cryptosystem MST3 S Magliveras, P Svaba, T van Trung, P Zajac Tatra Mt. Math. Publ 41, 65-78, 2008 | 47* | 2008 |
Overview of the Mceliece Cryptosystem and its Security M Repka, P Zajac Tatra Mountains Mathematical Publications 60 (1), 57-83, 2014 | 42 | 2014 |
Discrete logarithm problem in degree six finite fields P Zajac Ph. D. thesis, Slovak University of Technology, 2008 | 25 | 2008 |
A Reaction Attack on LEDApkc. T Fabsic, V Hromada, P Zajac CBC 2018, April 5 & 6, 2018, Davie, Florida, 2018 | 17 | 2018 |
Multiplicative complexity of bijective 4× 4 S-boxes P Zajac, M Jókay Cryptography and Communications 6 (3), 255-277, 2014 | 16 | 2014 |
A new method to solve MRHS equation systems and its connection to group factorization P Zajac Journal of Mathematical Cryptology 7 (4), 367–381, 2013 | 16 | 2013 |
On the use of the lattice sieve in the 3D NFS P Zajac Tatra Mountains Mathematical Publications 45 (1), 161-172, 2010 | 16 | 2010 |
Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity P Zajac Designs, Codes and Cryptography 82, 43-56, 2017 | 12 | 2017 |
Side channel attack on multiprecision multiplier used in protected ECDSA implementation M Varchola, M Drutarovsky, M Repka, P Zajac 2015 International Conference on ReConFigurable Computing and FPGAs …, 2015 | 12 | 2015 |
Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications P Zajac Sensors 21 (6), 2036, 2021 | 11 | 2021 |
Local reduction and the algebraic cryptanalysis of the block cipher GOST P Zajac, R Čagala Periodica Mathematica Hungarica 65 (2), 239-255, 2012 | 10 | 2012 |
HCPortal overview E Antal, P Zajac Proceedings of the 3rd International Conference on Historical Cryptology …, 2020 | 9 | 2020 |
Solving trivium-based Boolean equations using the method of syllogisms P Zajac Fundamenta Informaticae 114 (3-4), 359-373, 2012 | 9 | 2012 |
On the use of the method of syllogisms in algebraic cryptanalysis P Zajac Proceedings of the 1st Plenary Conference of the NIL-I-004, University of …, 2009 | 9 | 2009 |
Algorithm for Generating S-Boxes with Prescribed Differential Properties S Marochok, P Zajac Algorithms 16 (3), 157, 2023 | 8 | 2023 |
MRHS solver based on linear algebra and exhaustive search H Raddum, P Zajac Journal of Mathematical Cryptology 12 (3), 143-157, 2018 | 8 | 2018 |
Remarks on the NFS complexity P Zajac Tatra Mt. Math. Publ 41, 79-91, 2008 | 8* | 2008 |
Using SAT solvers in large scale distributed algebraic attacks against low entropy keys V Hromada, L Öllős, P Zajac Tatra Mountains Mathematical Publications 64 (1), 187-203, 2015 | 7 | 2015 |