On detection and mitigation of slow rate denial of service attacks M Sikora, T Gerlich, L Malina 2019 11th International Congress on Ultra Modern Telecommunications and …, 2019 | 31 | 2019 |
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich International Conference on Information Technology and Communications …, 2019 | 15 | 2019 |
Detection of wireless fake access points N Lovinger, T Gerlich, Z Martinasek, L Malina 2020 12th International Congress on Ultra Modern Telecommunications and …, 2020 | 14 | 2020 |
Comparison of Linux Filtering Tools for Mitigation of DDoS Attacks P Blazek, T Gerlich, Z Martinasek, J Frolka 2018 41st International Conference on Telecommunications and Signal …, 2018 | 11 | 2018 |
Baksheesh: similar yet different from gift A Baksi, J Breier, A Chattopadhyay, T Gerlich, S Guilley, N Gupta, T Isobe, ... Cryptology ePrint Archive, 2023 | 8 | 2023 |
On secure and side-channel resistant hardware implementations of post-quantum cryptography P Jedlicka, L Malina, P Socha, T Gerlich, Z Martinasek, J Hajny Proceedings of the 17th International Conference on Availability …, 2022 | 6 | 2022 |
Hardware implementation of Ascon A Kandi, A Baksi, T Gerlich, S Guilley, P Gan, J Breier, A Chattopadhyay, ... NIST Lightweight Cryptography Workshop 2023, 2023 | 5 | 2023 |
Scalable DDoS mitigation system P Blazek, T Gerlich, Z Martinasek 2019 42nd International Conference on Telecommunications and Signal …, 2019 | 3 | 2019 |
Side-channel and fault resistant ASCON implementation: A detailed hardware evaluation A Kandi, A Baksi, P Gan, S Guilley, T Gerlich, J Breier, A Chattopadhyay, ... 2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 307-312, 2024 | 2 | 2024 |
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version) A Kandi, A Baksi, P Gan, S Guilley, T Gerlich, J Breier, A Chattopadhyay, ... Cryptology ePrint Archive, 2024 | 1 | 2024 |
DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES T Gerlich, J Breier, P Sikora, Z Martinásek, A Gohr, A Baksi, X Hou Cryptology ePrint Archive, 2024 | | 2024 |
Nízkonákladový detektor využívající Raspberry Pi D Hirš, Y Safonov, Z Martinásek, T Gerlich | | |