What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vashek Matyas
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Revisiting the analysis of references among Common Criteria certified products.
Adam Janovsky
Lukasz Chmielewski
Petr Svenda
Jan Jancar
Vashek Matyas
2024
journals/compsec
sec-certs: Examining the security certification practice for better vulnerability mitigation.
Adam Janovsky
Jan Jancar
Petr Svenda
Lukasz Chmielewski
Jiri Michalik
Vashek Matyas
2024
journals/compsec
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction.
Agata Kruzikova
Michal Muzik
Lenka Knapova
Lenka Dedkova
David Smahel
Vashek Matyas
2024
conf/sec
Chain of Trust: Unraveling References Among Common Criteria Certified Products.
Adam Janovsky
Lukasz Chmielewski
Petr Svenda
Jan Jancar
Vashek Matyas
2022
journals/compsec
Usable and secure? User perception of four authentication methods for mobile banking.
Agata Kruzikova
Lenka Knapova
David Smahel
Lenka Dedkova
Vashek Matyas
2022
journals/joc
A Bad Day to Die Hard: Correcting the Dieharder Battery.
Marek Sýs
Lubomír Obrátil
Vashek Matyás
Dusan Klinec
2022
conf/sec
Usability Insights from Establishing TLS Connections.
Lydia Kraus
Matej Grabovský
Martin Ukrop
Katarína Galanská
Vashek Matyás
2022
conf/africacrypt
DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits.
Vladimir Sedlacek
Vojtech Suchanek
Antonin Dufka
Marek Sýs
Vashek Matyas
2020
conf/sec
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet.
Dusan Klinec
Vashek Matyas
2020
conf/esorics
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys.
Adam Janovsky
Matús Nemec
Petr Svenda
Peter Sekan
Vashek Matyas
2019
journals/istr
Examining PBKDF2 security margin - Case study of LUKS.
Andrea Visconti
Ondrej Mosnácek
Milan Broz
Vashek Matyás
2019
conf/acsac
Will you trust this TLS certificate?: perceptions of people working in IT.
Martin Ukrop
Lydia Kraus
Vashek Matyas
Heider Ahmad Mutleq Wahsheh
2018
journals/compsec
Experimental large-scale review of attractors for detection of potentially unwanted applications.
Vlasta Stavova
Lenka Dedkova
Vashek Matyas
Mike Just
David Smahel
Martin Ukrop
2018
conf/sec
Practical Cryptographic Data Integrity Protection with Full Disk Encryption.
Milan Broz
Mikulás Patocka
Vashek Matyás
2018
conf/ctrsa
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability.
Martin Ukrop
Vashek Matyas
2017
conf/ccs
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli.
Matús Nemec
Marek Sýs
Petr Svenda
Dusan Klinec
Vashek Matyas
2017
conf/acsac
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans.
Matús Nemec
Dusan Klinec
Petr Svenda
Peter Sekan
Vashek Matyas
2016
conf/uss
The Million-Key Question - Investigating the Origins of RSA Public Keys.
Petr Svenda
Matús Nemec
Peter Sekan
Rudolf Kvasnovský
David Formánek
David Komárek
Vashek Matyás
2016
conf/cans
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case.
Radim Ostádal
Petr Svenda
Vashek Matyás
2014
conf/acns
Improving Intrusion Detection Systems for Wireless Sensor Networks.
Andriy Stetsko
Tobiás Smolka
Vashek Matyás
Martin Stehlík
2013
conf/lightsec
An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications.
Jirí Kur
Vashek Matyás
Coauthors
Adam Janovsky
(4)
Agata Kruzikova
(2)
Andrea Visconti
(1)
Andriy Stetsko
(1)
Antonín Dufka
(1)
David Formánek
(1)
David Komárek
(1)
David Smahel
(3)
Dusan Klinec
(4)
Heider Ahmad Mutleq Wahsheh
(1)
Jan Jancar
(3)
Jirí Kur
(1)
Jiri Michalik
(1)
Katarína Galanská
(1)
Lenka Dedkova
(3)
Lenka Knapova
(2)
Lubomír Obrátil
(1)
Lukasz Chmielewski
(3)
Lydia Kraus
(2)
Marek Sýs
(3)
Martin Stehlík
(1)
Martin Ukrop
(4)
Matej Grabovský
(1)
Matús Nemec
(4)
Michal Muzik
(1)
Mike Just
(1)
Mikulás Patocka
(1)
Milan Broz
(2)
Ondrej Mosnácek
(1)
Peter Sekan
(3)
Petr Svenda
(8)
Radim Ostádal
(1)
Rudolf Kvasnovský
(1)
Tobiás Smolka
(1)
Vashek Matyas
(21)
Vladimir Sedlacek
(1)
Vlasta Stavova
(1)
Vojtech Suchanek
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to