Follow
Ján Jančár
Ján Jančár
Verified email at mail.muni.cz - Homepage
Title
Cited by
Cited by
Year
Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
J Jancar, V Sedlacek, P Svenda, M Sys
IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020
572020
“They’re not that hard to mitigate”: What cryptographic library developers think about timing attacks
J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ...
2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022
352022
Fooling primality tests on smartcards
V Sedlacek, J Jancar, P Svenda
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
42020
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
V Sedlacek, JJ Chi-Domínguez, J Jancar, BB Brumley
International Conference on the Theory and Application of Cryptology and …, 2021
32021
Optical cryptanalysis: Recovering cryptographic keys from power led light fluctuations
B Nassi, O Vayner, E Iluz, D Nassi, J Jancar, D Genkin, E Tromer, B Zadov, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
Security considerations for elliptic curve domain parameters selection
J Jančár
Masaryk university, 0
1
Chain of trust: Unraveling the references among Common Criteria certified products
A Janovsky, Ł Chmielewski, P Svenda, J Jancar, V Matyas
arXiv preprint arXiv:2404.14246, 2024
2024
sec-certs: Examining the security certification practice for better vulnerability mitigation
A Janovsky, J Jancar, P Svenda, Ł Chmielewski, J Michalik, V Matyas
arXiv preprint arXiv:2311.17603, 2023
2023
“These results must be false”: A usability evaluation of constant-time analysis tools
M Fourné, DDA Braga, J Jancar, M Sabt, P Schwabe, G Barthe, ...
The system can't perform the operation now. Try again later.
Articles 1–9