#### Filter Results:

- Full text PDF available (9)

#### Publication Year

2002

2017

- This year (4)
- Last 5 years (10)
- Last 10 years (19)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Petr Stembera, Martin Novotný
- 2011 14th Euromicro Conference on Digital System…
- 2011

The Hitag2 stream cipher is used in many real world applications, such as car immobilizers and door opening systems, as well as for the access control of buildings. The short length of the 48-bit secret key employed makes the cipher vulnerable to a brute-force attack, i.e., exhaustive key search. In this paper we develop the first hardware architecture for… (More)

- Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp
- IEEE Trans. Computers
- 2008

Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with available computing resources. Thus, in the absence of mathematical breakthroughs to a cryptanalytical problem, a promising way for tackling the computations involved is to build… (More)

- Timo Gendrullis, Martin Novotný, Andy Rupp
- CHES
- 2008

Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all over the world. During the last ten years A5/1 has been intensively analyzed [BB06,BD00,BSW01,EJ03,Gol97,MJB05,PS00]. However, most of the proposed attacks are just of… (More)

- Martin Novotný, David Slepicka, Milos Sedlacek
- IEEE Trans. Instrumentation and Measurement
- 2007

- Timo Gendrullis, Andy Rupp, Martin Novotný, Eidesstattliche Erklärung
- 2008

In this diploma thesis we present a real-world hardware-assisted attack on the well-known A5/1 stream cipher which is (still) used to secure GSM communication in most countries all over the world. During the last ten years A5/1 has been intensively analyzed [BB06, BD00, BSW01, EJ03, Gol97, MJB05, PS00]. However, most of the proposed attacks are just of… (More)

- Martin Novotný, Milos Sedlacek
- Computer Standards & Interfaces
- 2010

- Martin Novotný, Jan Schmidt
- 9th EUROMICRO Conference on Digital System Design…
- 2006

We present two architectures of digit-serial normal basis multiplier over GF(2<sup>m</sup>). Proposed multipliers are scalable by the digit width of general value in difference of the multiplier of Agnew et al., that may be scaled only by digit width that divides the degree m. This helps designers to trade area for speed e.g. in cryptographic systems, where… (More)

- Jan Kyncl, Martin Novotný
- ISCAS
- 2011

- Jan Pospísil, Martin Novotný
- DDECS
- 2012

- Jan Pospísil, Martin Novotný
- 2012 15th Euromicro Conference on Digital System…
- 2012

The PRESENT cipher is a symmetric block cipher with 64 bits of data block and 80 (or 128) bits of key. It is based on Substitution-permutation network and consists of 31 rounds. PRESENT is intended to be implemented in small embedded and contactless systems, thus its design needs only small amount of chip area and consumes low power. In this work we… (More)