The return of coppersmith's attack: Practical factorization of widely used rsa moduli M Nemec, M Sys, P Svenda, D Klinec, V Matyas Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 192 | 2017 |
The {Million-Key}{Question—Investigating} the Origins of {RSA} Public Keys P ©venda, M Nemec, P Sekan, R Kva¹òovský, D Formánek, D Komárek, ... 25th USENIX Security Symposium (USENIX Security 16), 893-910, 2016 | 53 | 2016 |
Measuring popularity of cryptographic libraries in internet-wide scans M Nemec, D Klinec, P Svenda, P Sekan, V Matyas Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 43 | 2017 |
Postcards from the post-http world: Amplification of https vulnerabilities in the web ecosystem S Calzavara, R Focardi, M Nemec, A Rabitti, M Squarcina 2019 IEEE Symposium on Security and Privacy (SP), 281-298, 2019 | 38 | 2019 |
Changing of the guards: Certificate and public key management on the internet CM Bruhner, O Linnarsson, M Nemec, M Arlitt, N Carlsson International Conference on Passive and Active Network Measurement, 50-80, 2022 | 11 | 2022 |
Biased RSA private keys: Origin attribution of GCD-factorable keys A Janovsky, M Nemec, P Svenda, P Sekan, V Matyas Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 6 | 2020 |
The properties of RSA key generation process in software libraries M Nemec Diss. Masarykova univerzita, Fakulta informatiky, 2016 | 6 | 2016 |
Postcertificates for revocation transparency N Korzhitskii, M Nemec, N Carlsson arXiv preprint arXiv:2203.02280, 2022 | 1 | 2022 |
Monogamous relationships with short-term commitment are the best (for certificate management) CM Bruhner, O Linnarsson, M Nemec, M Arlitt, N Carlsson Network and Distributed System Security (NDSS) Symposium 2024, 2024 | | 2024 |
Challenging RSA cryptosystem implementations M Nemec Università Ca'Foscari Venezia, 2020 | | 2020 |