Ján Jančár
Ján Jančár
Verified email at - Homepage
Cited by
Cited by
Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
J Jancar, V Sedlacek, P Svenda, M Sys
IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ...
2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022
Fooling primality tests on smartcards
V Sedlacek, J Jancar, P Svenda
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
V Sedlacek, JJ Chi-Domínguez, J Jancar, BB Brumley
International Conference on the Theory and Application of Cryptology and …, 2021
Security considerations for elliptic curve domain parameters selection
J Jančár
Masaryk university, 0
sec-certs: Examining the security certification practice for better vulnerability mitigation
A Janovsky, J Jancar, P Svenda, Ł Chmielewski, J Michalik, V Matyas
arXiv preprint arXiv:2311.17603, 2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations
B Nassi, O Vayner, E Iluz, D Nassi, J Jancar, D Genkin, E Tromer, B Zadov, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
The system can't perform the operation now. Try again later.
Articles 1–7