default search action
Róbert Lórencz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Tomás Rabas, Jirí Bucek, Róbert Lórencz:
Single-Trace Side-Channel Attacks on NTRU Implementation. SN Comput. Sci. 5(2): 239 (2024) - [j12]Olha Jurecková, Martin Jurecek, Mark Stamp, Fabio Di Troia, Róbert Lórencz:
Classification and online clustering of zero-day malware. J. Comput. Virol. Hacking Tech. 20(4): 579-592 (2024) - 2023
- [c29]Tomás Rabas, Jirí Bucek, Róbert Lórencz:
Single-Trace Attack on NTRU Decryption with Machine Learning and Template Profiling. DSD 2023: 124-129 - [c28]Tomás Rabas, Jirí Bucek, Róbert Lórencz:
SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key. ICISSP 2023: 135-143 - [c27]Josef Kokes, Róbert Lórencz:
On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael. ICISSP 2023: 174-179 - [i2]Olha Jurecková, Martin Jurecek, Róbert Lórencz:
Classification and Online Clustering of Zero-Day Malware. CoRR abs/2305.00605 (2023) - 2022
- [j11]Filip Kodýtek, Róbert Lórencz, Jirí Bucek:
Three counter value based ROPUFs on FPGA and their properties. Microprocess. Microsystems 88: 104375 (2022) - [j10]Josef Kokes, Jonatan Matejka, Róbert Lórencz:
Automatic Detection and Decryption of AES Using Dynamic Analysis. SN Comput. Sci. 3(5): 338 (2022) - [c26]Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz:
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. SECRYPT 2022: 415-427 - [c25]Tomás Rabas, Róbert Lórencz, Jirí Bucek:
Verification of PUF-based IoT Protocols with AVISPA and Scyther. SECRYPT 2022: 627-635 - [i1]Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz:
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. IACR Cryptol. ePrint Arch. 2022: 695 (2022) - 2021
- [j9]Martin Jurecek, Róbert Lórencz:
Application of Distance Metric Learning to Automated Malware Detection. IEEE Access 9: 96151-96165 (2021) - [c24]Josef Kokes, Jonatan Matejka, Róbert Lórencz:
Automatic Detection and Decryption of AES by Monitoring S-Box Access. ICISSP 2021: 172-180 - [c23]Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz:
Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques. ICISSP 2021: 376-383 - [c22]Martin Jurecek, Olha Jurecková, Róbert Lórencz:
Improving Classification of Malware Families using Learning a Distance Metric. ICISSP 2021: 643-652 - 2020
- [c21]Filip Kodýtek, Róbert Lórencz, Jirí Bucek:
Comparison of three counter value based ROPUFs on FPGA. DSD 2020: 205-212 - [c20]Simona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek:
Lightweight Authentication and Secure Communication Suitable for IoT Devices. ICISSP 2020: 75-83 - [c19]Simona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek:
Symmetric and Asymmetric Schemes for Lightweight Secure Communication. ICISSP (Revised Selected Papers) 2020: 97-114 - [c18]Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz:
Active Directory Kerberoasting Attack: Monitoring and Detection Techniques. ICISSP 2020: 432-439 - [c17]Martin Jurecek, Róbert Lórencz:
Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. ICISSP 2020: 725-732
2010 – 2019
- 2019
- [c16]Martin Jurecek, Jirí Bucek, Róbert Lórencz:
Side-Channel Attack on the A5/1 Stream Cipher. DSD 2019: 633-638 - 2018
- [j8]Martin Jurecek, Róbert Lórencz:
Malware Detection Using a Heterogeneous Distance Function. Comput. Informatics 37(3): 759-780 (2018) - 2017
- [j7]Simona Buchovecká, Róbert Lórencz, Filip Kodýtek, Jirí Bucek:
True random number generator based on ring oscillator PUF circuit. Microprocess. Microsystems 53: 33-41 (2017) - [j6]Jirí Bucek, Pavel Kubalík, Róbert Lórencz, Tomás Zahradnický:
Design of a Residue Number System Based Linear System Solver in Hardware. J. Signal Process. Syst. 87(3): 343-356 (2017) - 2016
- [j5]Ivan Simecek, Richard Fritsch, Daniel Langr, Róbert Lórencz:
Parallel Solver of Large Systems of Linear Inequalities Using Fourier-Motzkin Elimination. Comput. Informatics 35(6): 1307-1337 (2016) - [j4]Filip Kodýtek, Róbert Lórencz:
Proposal and Properties of Ring Oscillator-Based PUF on FPGA. J. Circuits Syst. Comput. 25(3): 1640016:1-1640016:17 (2016) - [j3]Filip Kodýtek, Róbert Lórencz, Jirí Bucek:
Improved ring oscillator PUF on FPGA and its properties. Microprocess. Microsystems 47: 55-63 (2016) - [c15]Simona Buchovecká, Róbert Lórencz, Filip Kodýtek, Jirí Bucek:
True Random Number Generator Based on ROPUF Circuit. DSD 2016: 519-523 - [c14]Filip Kodýtek, Róbert Lórencz, Jirí Bucek, Simona Buchovecká:
Temperature Dependence of ROPUF on FPGA. DSD 2016: 698-702 - 2015
- [c13]Filip Kodýtek, Róbert Lórencz:
A Design of Ring Oscillator Based PUF on FPGA. DDECS 2015: 37-42 - [c12]Jiri Khun, Ivan Simecek, Róbert Lórencz:
GPU Solver for Systems of Linear Equations with Infinite Precision. SYNASC 2015: 121-124 - 2014
- [c11]Jirí Bucek, Pavel Kubalík, Róbert Lórencz, Tomás Zahradnický:
An ASIC linear congruence solver synthesized with three cell libraries. ICECS 2014: 706-709 - [c10]Jirí Bucek, Pavel Kubalík, Róbert Lórencz, Tomás Zahradnický:
System on chip design of a linear system solver. ISSoC 2014: 1-6 - 2013
- [j2]Mikhail Platonov, Josef Hlavác, Róbert Lórencz:
Using Power-Up SRAM State of Atmel ATmega1284P Microcontrollers as Physical Unclonable Function for Key Generation and Chip Identification. Inf. Secur. J. A Glob. Perspect. 22(5-6): 244-250 (2013) - [c9]Josef Hlavác, Róbert Lórencz:
Arithmetic Unit for Computations in GF(p) with the Left-Shifting Multiplicative Inverse Algorithm. ARCS 2013: 268-279 - [c8]Tomás Zahradnický, Róbert Lórencz:
Architecture of a Parallel MOSFET Parameter Extraction System. ARCS 2013: 329-340 - [c7]Jirí Bucek, Pavel Kubalík, Róbert Lórencz, Tomás Zahradnický:
Comparison of FPGA and ASIC Implementation of a Linear Congruence Solver. DSD 2013: 284-287 - 2012
- [c6]Jirí Bucek, Pavel Kubalík, Róbert Lórencz, Tomás Zahradnický:
Dedicated hardware implementation of a linear congruence solver in FPGA. ICECS 2012: 689-692
2000 – 2009
- 2008
- [c5]Tomás Zahradnický, Róbert Lórencz, Pavel Musil:
Making ProTools Accessible for Visually Impaired. ICCHP 2008: 781-788 - 2006
- [c4]Jirí Bucek, Róbert Lórencz:
Comparing Subtraction-Free and Traditional AMI. DDECS 2006: 97-99 - [c3]Tomás Zahradnický, Róbert Lórencz:
Making Nonaccessible Applications Accessible for Visually Impaired. ICCHP 2006: 1047-1054 - 2005
- [j1]Róbert Lórencz, Josef Hlavác:
Subtraction-free Almost Montgomery Inverse algorithm. Inf. Process. Lett. 94(1): 11-14 (2005) - 2004
- [c2]Tomás Zahradnický, Róbert Lórencz:
MOSFET Mathematical Model Parameter Extraction. CCCT (1) 2004: 400-404 - 2002
- [c1]Róbert Lórencz:
New Algorithm for Classical Modular Inverse. CHES 2002: 57-70
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint