Follow
Ján Jančár
Ján Jančár
Verified email at mail.muni.cz - Homepage
Title
Cited by
Cited by
Year
Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
J Jancar, V Sedlacek, P Svenda, M Sys
IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020
672020
“They’re not that hard to mitigate”: What cryptographic library developers think about timing attacks
J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ...
2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022
552022
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
V Sedlacek, JJ Chi-Domínguez, J Jancar, BB Brumley
International Conference on the Theory and Application of Cryptology and …, 2021
62021
The state of tooling for verifying constant-timeness of cryptographic implementations
J Jancar
https://neuromancer.sk/article/26, 2021
62021
Fooling primality tests on smartcards
V Sedlacek, J Jancar, P Svenda
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
52020
Optical cryptanalysis: Recovering cryptographic keys from power led light fluctuations
B Nassi, O Vayner, E Iluz, D Nassi, J Jancar, D Genkin, E Tromer, B Zadov, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
sec-certs: Examining the security certification practice for better vulnerability mitigation
A Janovsky, J Jancar, P Svenda, Ł Chmielewski, J Michalik, V Matyas
Computers & Security 143, 103895, 2024
22024
Chain of trust: Unraveling references among Common Criteria certified products
A Janovsky, Ł Chmielewski, P Svenda, J Jancar, V Matyas
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2024
22024
“These results must be false”: A usability evaluation of constant-time analysis tools
M Fourné, DDA Braga, J Jancar, M Sabt, P Schwabe, G Barthe, ...
33th USENIX Security Symposium (USENIX Security 2024), 2024
12024
Security considerations for elliptic curve domain parameters selection
J Jančár
Masaryk university, 2018
1*2018
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis
J Jancar, V Suchanek, P Svenda, V Sedlacek, Ł Chmielewski
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (4 …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–11