Vladimír Sedláček

Vladimír Sedláček
Rutgers, The State University of New Jersey | Rutgers · Department of Mathematics

Ph.D.

About

10
Publications
2,203
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
31
Citations
Citations since 2017
10 Research Items
31 Citations
20172018201920202021202220230246810
20172018201920202021202220230246810
20172018201920202021202220230246810
20172018201920202021202220230246810

Publications

Publications (10)
Chapter
It can be tricky to trust elliptic curves standardized in a non-transparent way. To rectify this, we propose a systematic methodology for analyzing curves and statistically comparing them to the expected values of a large number of generic curves with the aim of identifying any deviations in the standard curves.For this purpose, we put together the...
Preprint
Full-text available
It can be tricky to trust elliptic curves standardized in a non-transparent way. To rectify this, we propose a systematic methodology for analyzing curves and statistically comparing them to the expected values of a large number of generic curves with the aim of identifying any deviations in the standard curves. For this purpose, we put together t...
Chapter
Full-text available
The Refined Power Analysis, Zero-Value Point, and Exceptional Procedure attacks introduced side-channel techniques against specific cases of elliptic curve cryptography. The three attacks recover bits of a static ECDH key adaptively, collecting information on whether a certain multiple of the input point was computed. We unify and generalize these...
Conference Paper
Full-text available
We present our discovery of a group of side-channel vulnerabilities in implementations of the ECDSA signature algorithm in a widely used Atmel AT90SC FIPS 140-2 certified smartcard chip and five cryptographic libraries (libgcrypt, wolfSSL, MatrixSSL, SunEC/OpenJDK/Oracle JDK, Crypto++). Vulnerable implementations leak the bit-length of the scalar u...
Conference Paper
Full-text available
We analyse whether the smartcards of the JavaCard platform correctly validate primality of domain parameters. The work is inspired by Prime and prejudice: primality testing under adversarial conditions, where the authors analysed many open-source libraries and constructed pseudoprimes fooling the primality testing functions. However, in the case of...
Chapter
We analyse whether the smartcards of the JavaCard platform correctly validate primality of domain parameters. The work is inspired by Albrecht et al. [1], where the authors analysed many open-source libraries and constructed pseudoprimes fooling the primality testing functions. However, in the case of smartcards, often there is no way to invoke the...
Article
Full-text available
We present our discovery of a group of side-channel vulnerabilities in implementations of the ECDSA signature algorithm in a widely used Atmel AT90SC FIPS 140-2 certified smartcard chip and five cryptographic libraries (libgcrypt, wolfSSL, MatrixSSL, SunEC/OpenJDK/Oracle JDK, Crypto++). Vulnerable implementations leak the bit-length of the scalar u...
Article
Full-text available
In this paper we study the groups of circular numbers and circular units in Sinnott’s sense in real abelian fields with exactly four ramified primes under certain conditions. More specifically, we construct ℤ-bases for them in five special infinite families of cases. We also derive some results about the corresponding module of relations (in one fa...

Network

Cited By