A reaction attack on the QC-LDPC McEliece cryptosystem T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017 | 71 | 2017 |
A reaction attack on LEDApkc T Fabsic, V Hromada, P Zajac Cryptology ePrint Archive, 2018 | 15 | 2018 |
Simple power analysis attack on the QC-LDPC McEliece cryptosystem T Fabšič, O Gallo, V Hromada Tatra Mountains Mathematical Publications 67 (1), 85-92, 2016 | 15 | 2016 |
Tiling R 5 by Crosses P Horak, V Hromada Discrete & Computational Geometry 51 (2), 269-284, 2014 | 7* | 2014 |
Using SAT solvers in large scale distributed algebraic attacks against low entropy keys V Hromada, L Öllős, P Zajac Tatra Mountains Mathematical Publications 64 (1), 187-203, 2015 | 6 | 2015 |
Secure Implementation of a Quantum-Future GAKE Protocol R Abela, C Colombo, P Malo, P Sýs, T Fabšič, O Gallo, V Hromada, ... International Workshop on Security and Trust Management, 103-121, 2021 | 4 | 2021 |
A cipher based on prefix codes O Grošek, V Hromada, P Horák Sensors 21 (18), 6236, 2021 | 4 | 2021 |
A reaction attack on the QC-LDPC McEliece cryptosystem T Fabsic, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson Cryptology ePrint Archive, 2017 | 4 | 2017 |
Phase-shift fault analysis of Trivium V Hromada, J Varga Studia Scientiarum Mathematicarum Hungarica 52 (2), 205-220, 2015 | 3 | 2015 |
A NEW STREAM CIPHER BASED ON FIALKA M-125 E Antal, V Hromada Tatra Mountains Mathematical Publications 57 (1), 101-118, 2013 | 3 | 2013 |
Using GeMSS128 in a ring signature scheme V Hromada, D Lešcinská Publicationes Mathematicae Debrecen 100, 567-582, 2022 | 2 | 2022 |
Phase-shift Fault Analysis of Grain v1 V Hromada, T Pethö International Journal of Electronics and Telecommunications 64 (2), 131-136, 2018 | 2 | 2018 |
Rotation-Equivalence classes of binary vectors O Grošek, V Hromada Tatra Mountains Mathematical Publications 67 (1), 93-98, 2016 | 2 | 2016 |
On the maximum size of a prefix code P Horák, V Hromada, O Grošek IEEE Transactions on Information Theory, 2023 | 1 | 2023 |
A micro-controller implementation of a Fialka M-125 based stream cipher E Antal, V Hromada Tatra Mountains Mathematical Publications 60 (1), 101-116, 2014 | 1 | 2014 |
Experimental Evaluation of SAT Attack on Logic Locking M Vojvoda, V Hromada, F Janikovský, J Kučerák, M Jókay Preprints, 2024 | | 2024 |
Post-Quantum Cryptography Migration: Challenges in Education T Fabšič, O Grošek, V Hromada, P Zajac Toward a Quantum-Safe Communication Infrastructure, 13-23, 2024 | | 2024 |
A Note on the Maximum Size of a Prefix Code V Hromada, O Grošek IEEE Access 10, 125955-125962, 2022 | | 2022 |
Using Poly-Dragon cryptosystem in a pseudorandom number generator MSTg V Hromada, M Vojvoda Tatra Mountains Mathematical Publications 61 (1), 105-116, 2014 | | 2014 |
LIGHTWEIGHT CRYPTOGRAPHY WITH AVR 8-BIT MICROPROCESSOR IN REMOTE CONTROLLING T Frťala, V Hromada | | 2014 |