Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces J Jancar, V Sedlacek, P Svenda, M Sys IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020 | 59 | 2020 |
“They’re not that hard to mitigate”: What cryptographic library developers think about timing attacks J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ... 2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022 | 43 | 2022 |
The state of tooling for verifying constanttimeness of cryptographic implementations J Jancar | 6 | 2021 |
A formula for disaster: a unified approach to elliptic curve special-point-based attacks V Sedlacek, JJ Chi-Domínguez, J Jancar, BB Brumley International Conference on the Theory and Application of Cryptology and …, 2021 | 4 | 2021 |
Fooling primality tests on smartcards V Sedlacek, J Jancar, P Svenda Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 4 | 2020 |
Optical cryptanalysis: Recovering cryptographic keys from power led light fluctuations B Nassi, O Vayner, E Iluz, D Nassi, J Jancar, D Genkin, E Tromer, B Zadov, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
sec-certs: Examining the security certification practice for better vulnerability mitigation A Janovsky, J Jancar, P Svenda, Ł Chmielewski, J Michalik, V Matyas Computers & Security 143, 103895, 2024 | 1 | 2024 |
Chain of trust: Unraveling the references among Common Criteria certified products A Janovsky, Ł Chmielewski, P Svenda, J Jancar, V Matyas arXiv preprint arXiv:2404.14246, 2024 | 1 | 2024 |
“These results must be false”: A usability evaluation of constant-time analysis tools M Fourné, DDA Braga, J Jancar, M Sabt, P Schwabe, G Barthe, ... 33th USENIX Security Symposium (USENIX Security 2024), 2024 | 1 | 2024 |
Security considerations for elliptic curve domain parameters selection J Jančár Masaryk university, 0 | 1 | |