Name
Papers
Collaborators
PETR SVENDA
32
41
Citations 
PageRank 
Referers 
73
14.22
155
Referees 
References 
407
204
Search Limit
100407
Title
Citations
PageRank
Year
Practical approach to re-securing compromised wireless sensor networks.00.342021
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces.00.342020
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets00.342020
Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks.00.342019
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification.00.342019
Towards Low-level Cryptographic Primitives for JavaCards.00.342018
Adaptive Secrecy Amplification with Radio Channel Key Extraction00.342018
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.40.532017
The Efficient Randomness Testing using Boolean Functions.20.402017
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans.10.352017
BoolTest - The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256.00.342017
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli.60.512017
Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion).00.342016
The Million-Key Question - Investigating The Origins Of Rsa Public Keys40.462016
Reconsidering Attacker Models in Ad-Hoc Networks.00.342016
On Secrecy Amplification Protocols00.342015
Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a Service.00.342015
Challenges of Fiction in Network Security - Perspective of Virtualized Environments.00.342015
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper).20.422014
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits.00.342013
On the Origin of Yet another Channel.00.342013
On the Origin of Yet another Channel (Transcript of Discussion).00.342013
Evolutionary design of message efficient secrecy amplification protocols20.412012
Two Improvements of Random Key Predistribution for Wireless Sensor Networks.30.442012
Secure Logging Of Retained Data For An Anonymity Service10.432009
Security And Robustness Of Wireless Sensor Networks10.482009
Evolutionary design of secrecy amplification protocols for wireless sensor networks60.532009
The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers201.682009
Towards True Random Number Generation in Mobile Environments110.742009
Evolutionary Design of Attack Strategies.00.342009
Authenticated key exchange with group support for wireless sensor networks10.352007
Smart Dust Security -- Key Infection Revisited90.732006