![]() | ![]() |
2007 | ||
---|---|---|
9 | Richard Ostertág, Martin Stanek: On High-Rate Cryptographic Compression Functions. Computers and Artificial Intelligence 26(1): (2007) | |
2006 | ||
8 | EE | Martin Stanek, Lubica Stanekova: Unpuzzling Puzzle (analysis of a video encryption algorithm). AINA (2) 2006: 20-24 |
7 | EE | Martin Stanek: Analysis of Fast Blockcipher-Based Hash Functions. ICCSA (3) 2006: 426-435 |
6 | Eduard Toman, Martin Stanek: Analysis of Greedy Algorithm for Vertex Covering of Random Graph by Cubes. Computers and Artificial Intelligence 25(5): (2006) | |
2005 | ||
5 | EE | Lubica Stanekova, Martin Stanek: Fast Contract Signing with Batch Oblivious Transfer. Communications and Multimedia Security 2005: 1-10 |
2004 | ||
4 | Lubica Liskova, Martin Stanek: Efficient Simultaneous Contract Signing. SEC 2004: 441-456 | |
1999 | ||
3 | Martin Stanek, Daniel Olejar: Weaknesses in EHA Authentication and Key Distribution Protocol. Communications and Multimedia Security 1999: 87-95 | |
2 | Martin Stanek, Daniel Olejar: Integrity Testing in WWW Environment. IICIS 1999: 111-120 | |
1998 | ||
1 | EE | Daniel Olejar, Martin Stanek: On Cryptographic Properties of Random Boolean Functions. J. UCS 4(8): 705-717 (1998) |
1 | Lubica Liskova | [4] |
2 | Daniel Olejar | [1] [2] [3] |
3 | Richard Ostertág | [9] |
4 | Lubica Stanekova | [5] [8] |
5 | Eduard Toman | [6] |