The return of coppersmith's attack: Practical factorization of widely used rsa moduli M Nemec, M Sys, P Svenda, D Klinec, V Matyas Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 145 | 2017 |
The {Million-Key}{Question—Investigating} the Origins of {RSA} Public Keys P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ... 25th USENIX Security Symposium (USENIX Security 16), 893-910, 2016 | 41 | 2016 |
Measuring popularity of cryptographic libraries in internet-wide scans M Nemec, D Klinec, P Svenda, P Sekan, V Matyas Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 28 | 2017 |
Postcards from the post-http world: Amplification of https vulnerabilities in the web ecosystem S Calzavara, R Focardi, M Nemec, A Rabitti, M Squarcina 2019 IEEE Symposium on Security and Privacy (SP), 281-298, 2019 | 26 | 2019 |
The properties of RSA key generation process in software libraries M Nemec Diss. Masarykova univerzita, Fakulta informatiky, 2016 | 5 | 2016 |
Changing of the Guards: Certificate and Public Key Management on the Internet CM Bruhner, O Linnarsson, M Nemec, M Arlitt, N Carlsson International Conference on Passive and Active Network Measurement, 50-80, 2022 | 1 | 2022 |
Biased RSA private keys: Origin attribution of GCD-factorable keys A Janovsky, M Nemec, P Svenda, P Sekan, V Matyas European Symposium on Research in Computer Security, 505-524, 2020 | 1 | 2020 |
Postcertificates for Revocation Transparency N Korzhitskii, M Nemec, N Carlsson arXiv preprint arXiv:2203.02280, 2022 | | 2022 |
Challenging RSA cryptosystem implementations M Nemec Universitŕ Ca'Foscari Venezia, 2020 | | 2020 |