Personal information

applied cryptography, smartcards, javacard, MPC

Activities

Employment (1)

Masarykova univerzita: Brno, CZ

2019-07-01 to present | Associate professor (Department of Computer Systems and Communications)
Employment
Source: Self-asserted source
Petr Svenda

Works (39)

A Decentralised Public Key Infrastructure for X-Road

2023-08-29 | Conference paper
Contributors: Mariia Bakhtina; Kin Long Leung; Raimundas Matulevičius; Ahmed Awad; Petr Švenda
Source: check_circle
Crossref

Enabling Efficient Threshold Signature Computation via Java Card API

2023-08-29 | Conference paper
Contributors: Antonín Dufka; Petr Švenda
Source: check_circle
Crossref

Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification

Sensors
2019-11 | Journal article | Author
Contributors: Radim Ostadal; Vashek Matyas; Petr Svenda; Lukas Nemec
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks

Sensors
2019-02 | Journal article | Author
Contributors: Lukas Nemec; Vashek Matyas; Radim Ostadal; Petr Svenda; Pierre-Louis Palant
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

The Million-Key Question � Investigating the Origins of RSA Public Keys

The 25th USENIX Security Symposium (UsenixSec'2016)
2016 | Conference paper
Part of ISBN: 978-1-931971-32-4
Source: Self-asserted source
Petr Svenda

Architecture Considerations for Massively Parallel Hardware Security Platform

Security, Privacy, and Applied Cryptography Engineering
2015 | Other
Contributors: Dan Cvrček; Petr Švenda
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

On Secrecy Amplification Protocols

Information Security Theory and Practice
2015 | Other
Contributors: Radim Ošťádal; Petr Švenda; Vashek Matyáš
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

WSNProtectLayer: Security Middleware for Wireless Sensor Networks

Securing Cyber-Physical Systems
2015-09 | Other
Contributors: Vashek Matyáš; Petr Švenda; Andriy Stetsko; Dušan Klinec; Filip Jurnečka; Martin Stehlík
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

A new approach to secrecy amplification in partially compromised networks (invited paper)

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84910663953

Contributors: Oštádal, R.; Švenda, P.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper)

Security, Privacy, and Applied Cryptography Engineering
2014 | Other
Contributors: Radim Ošťádal; Petr Švenda; Václav Matyáš
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper)

Security, Privacy, and Applied Cryptography Engineering
2014 | Book chapter
WOSUID:

WOS:000349015300007

Contributors: Ostadal, Radim; Svenda, Petr; Matyas, Vaclav; Chakraborty, RS; Matyas, V; Schaumont, P
Source: Self-asserted source
Petr Svenda via ResearcherID

Constructing empirical tests of randomness

SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications
2014 | Conference paper
EID:

2-s2.0-84908883861

Contributors: Sýs, M.; Švenda, P.; Ukrop, M.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Constructing Empirical Tests of Randomness

Proceedings of the 11th International Conference on Security and Cryptography
2014 | Conference paper
Contributors: Marek Sýs; Petr Švenda; Martin Ukrop; Vashek Matyáš
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

Determining cryptographic distinguishers for estream and sha-3 candidate functions with evolutionary circuits

Communications in Computer and Information Science
2014 | Book
EID:

2-s2.0-84908528308

Contributors: Švenda, P.; Ukrop, M.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits

E-Business and Telecommunications
2014 | Other
Contributors: Petr Švenda; Martin Ukrop; Vashek Matyáš
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

Security Protocols XXII

Lecture Notes in Computer Science
2014 | Book
Contributors: Bruce Christianson; James Malcolm; Vashek Matyáš; Petr Švenda; Frank Stajano; Jonathan Anderson
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

Evolutionary design of attack strategies

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84872466638

Contributors: Kůr, J.; Matyáš, V.; Švenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Evolutionary Design of Attack Strategies

Security Protocols XVII
2013 | Other
Contributors: Petr Švenda
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

Evolutionary Design of Attack Strategies

Security Protocols XVII
2013 | Other
Contributors: Jiří Kůr; Václav Matyáš; Petr Švenda
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

Evolutionary design of attack strategies (transcript of discussion)

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84872483711

Contributors: Švenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

On the origin of yet another channel

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84893426871

Contributors: Švenda, P.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

On the origin of yet another channel

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84893388392

Contributors: Švenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Towards cryptographic function distinguishers with evolutionary circuits

ICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings
2013 | Conference paper
EID:

2-s2.0-84887793398

Contributors: Švenda, P.; Ukrop, M.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Two improvements of random key predistribution for wireless sensor networks

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2013 | Book
EID:

2-s2.0-84874524348

Contributors: Kůr, J.; Matyáš, V.; Švenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Evolutionary design of message efficient secrecy amplification protocols

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84859147266

Contributors: Smolka, T.; Švenda, P.; Sekanina, L.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Special issue on applied cryptography - Guest editorial

Infocommunications Journal
2012 | Journal article
EID:

2-s2.0-84875825003

Contributors: Matyáš, V.; Řiha, Z.; Švenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Two improvements of random key predistribution for wireless sensor networks - Revised version

Infocommunications Journal
2012 | Journal article
EID:

2-s2.0-84875865672

Contributors: Kůr, J.; Mátyaš, V.; Švenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Attack detection vs. privacy - How to find the link or how to hide it?

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011 | Book
EID:

2-s2.0-84855768530

Contributors: Kůr, J.; Matyáš, V.; Stetsko, A.; Švenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Attack Detection vs. Privacy - How to Find the Link or How to Hide It?

Security Protocols Xix
2011 | Journal article
WOSUID:

WOS:000307041200018

Contributors: Kur, Jiri; Matyas, Vashek; Stetsko, Andriy; Svenda, Petr; Christianson, B; Crispo, B; Malcolm, J; Stajano, F
Source: Self-asserted source
Petr Svenda via ResearcherID

Secure Logging of Retained Data for an Anonymity Service

Privacy and Identity Management for Life
2010 | Other
Contributors: Stefan Köpsell; Petr Švenda
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

Secure Logging of Retained Data for an Anonymity Service

Privacy and Identity Management For Life
2010 | Journal article
WOSUID:

WOS:000301966400024

Contributors: Koepselll, Stefan; Svenda, Petr; Bezzi, M; Duquenoy, P; FischerHubner, S; Hansen, M; Zhang, G
Source: Self-asserted source
Petr Svenda via ResearcherID

Authenticated key exchange with group support for wireless sensor networks

From Problem toward Solution: Wireless Sensor Networks Security
2009 | Book
EID:

2-s2.0-84895301300

Contributors: Švenda, P.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Evolutionary design of secrecy amplification protocols for wireless sensor networks

Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
2009 | Conference paper
EID:

2-s2.0-70349113077

Contributors: Švenda, P.; Sekanina, L.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

The Future of Identity in the Information Society

IFIP Advances in Information and Communication Technology
2009 | Book
Contributors: Vashek Matyáš; Simone Fischer-Hübner; Daniel Cvrček; Petr Švenda
Source: Self-asserted source
Petr Svenda via Crossref Metadata Search

Towards true random number generation in mobile environments

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009 | Book
EID:

2-s2.0-78650734264

Contributors: Bouda, J.; Krhovjak, J.; Matyas, V.; Svenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Towards True Random Number Generation in Mobile Environments

Identity and Privacy in the Internet Age, Proceedings
2009 | Journal article
WOSUID:

WOS:000273517300013

Contributors: Bouda, Jan; Krhovjak, Jan; Matyas, Vashek; Svenda, Petr; Josang, A; Maseng, T; Knapskog, SJ
Source: Self-asserted source
Petr Svenda via ResearcherID

Authenticated key exchange with group support for wireless sensor networks

2007 Ieee International Conference on Mobile Ad-Hoc and Sensor Systems, Vols 1-3
2007 | Journal article
WOSUID:

WOS:000256007500175

Contributors: Svenda, Petr; Matyas, Vaclav; IEEE
Source: Self-asserted source
Petr Svenda via ResearcherID

Authenticated key exchange with group support for wireless sensor networks

2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS
2007 | Conference paper
EID:

2-s2.0-50249139114

Contributors: Švenda, P.; Matyáš, V.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier

Smart Dust Security - Key Infection Revisited

Electronic Notes in Theoretical Computer Science
2006 | Journal article
EID:

2-s2.0-33747360738

Contributors: Cvrcek, D.; Svenda, P.
Source: Self-asserted source
Petr Svenda via Scopus - Elsevier