Publications & Downloads

This section gathers our research results from most recent projects. Both important publications and experimental implementations can be found here.

DateAuthorsTitleConference/JournalLink
2021/10/04RICCI, S.; DZURENDA, P.; HAJNÝ, J.; MALINA, L.Privacy-Enhancing Group Signcryption SchemeIEEE AccessIEEE
2021/08/17HAJNÝ, J.; RICCI, S.; PIESARSKAS, E.; SIKORA, M.Cybersecurity Curricula DesignerARES 2021 (ETACS 2021)ACM
2021/08/17DZURENDA, P.; RICCI, S.; CASANOVA MARQUÉS, R.; HAJNÝ, J.; ČÍKA, P.Secret Sharing-based Authenticated Key Agreement ProtocolARES 2021 (SP2I 2021)ACM
2021/08/17RICCI, S.; MALINA, L.; JEDLIČKA, P.; SMÉKAL, D.; HAJNÝ, J.; CÍBIK, P.; DZURENDA, P.; DOBIÁŠ, P.Implementing CRYSTALS-Dilithium Signature Scheme on FPGAsARES 2021 (main track)ACM
2021/08/17DZURENDA, P.; ANGLÉS, C.; RICCI, S.; MALINA, L.Privacy-Preserving Online Parking Based on Smart ContractsARES 2021 (SP2I 2021)ACM
2021/08/17RICCI, S.; JANOUT, V.; PARKER, S.; JEŘÁBEK, J.; HAJNÝ, J.; CHATZOPOULOU, A.; BADONNEL, R. PESTLE Analysis of Cybersecurity EducationARES 2021 (ETACS 2021)ACM
2021/08/17LIESKOVAN, T.; HAJNÝ, J. Building Open Source Cyber Range To Teach Cyber SecurityARES 2021 (ETACS 2021)ACM
2021/07/01HAJNÝ, J.; RICCI, S.; PIESARSKAS, E.; LEVILLAIN, O.; GALLETTA, L.; DE NICOLA, R.Framework, Tools and Good Practices for Cybersecurity CurriculaIEEE AccessIEEE
2021/06/06RICCI, S.; JEDLIČKA, P.; CÍBIK, P.; DZURENDA, P.; MALINA, L.; HAJNÝ, J.Towards CRYSTALS-Kyber VHDL ImplementationSECRYPT 2021Scitepress
2021/06/06CASANOVA MARQUÉS, R.; PASCACIO, P.; HAJNÝ, J.; TORRES-SOSPEDRA, J.Anonymous Attribute-Based Credentials in Collaborative Indoor Positioning SystemsSECRYPT 2021Scitepress
2021/05/25HAJNÝ, J.; DZURENDA, P.; CASANOVA MARQUÉS, R.; MALINA, L.Privacy ABCs: Now Ready for Your Wallets!IEEE PerCom 2021IEEE
2021/05/22Farras O.; Ribes-Gonzales J.; Ricci S.Privacy-preserving Data Splitting: A Combinatorial ApproachDESIGNS CODES AND CRYPTOGRAPHYSpringer
2021/02/24MALINA, L.; DZURENDA, P.; RICCI, S.; HAJNÝ, J.; SRIVASTAVA, G.; MATULEVICIUS, R.; AFFIA, A.; LAURENT, M.; HAQUE SULTAN, N.; TANG, Q.Post-Quantum Era Privacy Protection for Intelligent InfrastructuresIEEE AccessIEEE
2021/02/04MALINA, L.; SMÉKAL, D.; RICCI, S.; HAJNÝ, J.; CÍBIK, P.; HRABOVSKÝ, J.Hardware-Accelerated Cryptography for Software-Defined Networks with P4.SecITC 2020/LNCSSpringer
2021/02/04SAFONOV, Y.; MARTINÁSEK, Z.; MALINA, L.; PECL, D.; KAČIC, M.; ALMER, L.Manager asks: Which vulnerability must be eliminated first?SecITC 2020/LNCSSpringer
2020/10/16SIKORA, P.; MALINA, L.; KIAC, M.; MARTINÁSEK, Z.; ŘÍHA, K.; PŘINOSIL, J.; JIŘÍK, L.; SRIVASTAVA, G.Artificial Intelligence-based Surveillance System for Railway Crossing Traffic.IEEE SENSORS JOURNALIEEE
2020/01/20MALINA, L.; RICCI, S.; DZURENDA, P.; SMÉKAL, D.; HAJNÝ, J.; GERLICH, T. Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.Innovative Security Solutions for Information Technology and Communications (SecITC)Springer
2019/12/10MALINA, L.; SRIVASTAVA, G.; DZURENDA, P.; HAJNÝ, J.; RICCI, S.A Privacy-Enhancing Framework for Internet of Things Services.13th International Conference on Network and System SecuritySpringer
2019/09/17MALINA, L.; SRIVASTAVA, G.; DZURENDA, P.; HAJNÝ, J.; FUJDIAK, R. A Secure Publish/Subscribe Protocol for Internet of ThingsARES 2019ACM
2019/06/05HAJNÝ, J.; DZURENDA, P.; CAMENISCH, J.; DRIJVERS, MFast Keyed-Verification Anonymous Credentials on Standard Smart CardsIFIP Advances in Information and Communication TechnologySpringer
2018/10/15MARTINÁSEK, Z.; HAJNÝ, J.; SMÉKAL, D.; MALINA, L.; MATOUŠEK, D.; KEKELY, M.; MENTES, N.200 Gbps Hardware-Accelerated Encryption System for FPGA Network CardsACM CCS ASHESTBA
2018/08/01MALINA, L.; DZURENDA, P.; HAJNÝ, J.; MARTINÁSEK, Z.Secure and Efficient Two-factor Zero-knowledge Authentication Solution for Access Control SystemsCOMPUTERS & SECURITYElsevier
2018/08/01MALINA, L.; HAJNÝ, J.; DZURENDA, P.; RICCI, S.Lightweight Ring Signatures for Decentralized Privacy-preserving TransactionsSECRYPT 2018SCITEPRESS
2018/08/01HAJNÝ, J.; DZURENDA, P.; MALINA, L.; RICCI, S.Anonymous Data Collection Scheme from Short Group SignaturesSECRYPT 2018ScitePress
2018/07/29HAJNÝ, J.; DZURENDA, P.; MALINA, L.Multidevice Authentication with Strong Privacy ProtectionWIRELESS COMMUNICATIONS & MOBILE COMPUTINGWiley/Hindawi
2017/10/10DZURENDA, P.; RICCI SARA; HAJNÝ, J.; MALINA, L.Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards15th International Conference on Privacy, Security and Trust (PST) 2017UniCalgary
2017/07/24DZURENDA, P.; HAJNÝ, J.; MALINA, L.; RICCI, S.Anonymous Credentials with Practical Revocation using Elliptic CurvesSECRYPT 2017ScitePress
2016/11/14MALINA, L.; HAJNÝ, J.; FUJDIAK, R.; HOŠEK, J. On Perspective of Security and Privacy- Preserving Solutions in the Internet of Things. Computer NetworksElsevier
2016/11/14MALINA, L.; HORVÁTH, T.; MÜNSTER, P.; HAJNÝ, J.Security Solution with Signal Propagation Measurement for Gigabit Passive Optical Networks. OPTIKElsevier
2016/11/14MALINA, L.; HAJNÝ, J.; MLÝNEK, P.; MACHÁČEK, J.; SVOBODA, R.Towards Efficient Application of Cryptographic Schemes on Constrained Microcontroller. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERSJCSC
2016/11/14HAJNÝ, J.; DZURENDA, P.; MALINA, L. Multi- Device Authentication using Wearables and IoT.SECRYPT 2016. Lisbon, PortugalTBA
2016/11/14MARTINÁSEK, Z.; ZEMAN, V.; MALINA, L.; MARTINÁSEK, J.k- Nearest Neighbors Algorithm in Profiling Power Analysis Attacks. RadioengineeringTBA
2016/10/24CAMENISCH, J.; DRIJVERS, M.; HAJNÝ, J.Scalable Revocation Scheme for Anonymous Credentials Based on n- times Unlinkable ProofsCCS WPES 2016, Vienna, ATTBA
2016/03/14OMETOV, A.; MAŠEK, P.; MALINA, L.; FLOREA, R.; HOŠEK, J.; ANDREEV, S.; HAJNÝ, J.; NIUTANEN, J.; KOUCHERYAVY, Y. Feasibility Characterization of Cryptographic Primitives for Constrained (Wearable) IoT DevicesIEEE International Conference on Pervasive Computing and Communications (PerCom). 2016, Sydney, AUTBA
2015/11/01HAJNÝ, J.; DZURENDA, P.; MALINA, L.Privacy-Enhanced Data Collection Scheme for Smart- MeteringINSCRYPT 2015, Beijing, ChinaSpringer
2015/10/30MALINA, L.; HAJNÝ, J.; ZEMAN, V.Light-weight group signatures with time- bound membershipSecurity and Communication NetworksWiley
2015/08/01HAJNÝ, J.; MALINA, L.; DZURENDA, P.Secure Physical Access Control with Strong Cryptographic ProtectionSECRYPT 2015. Colmar, FranceScitePress
2015/08/01MALINA, L.; MÜNSTER, P.; HAJNÝ, J.; HORVÁTH, T.Towards Secure Gigabit Passive Optical NetworksSECRYPT 2015. Colmar, FranceScitePress
2015/07/10HAJNÝ, J.; DZURENDA, P.; MALINA, L.Attribute- based credentials with cryptographic collusion prevention. Security and Communication NetworksWiley
2015/02/01MALINA, L.; HAJNÝ, J.; DZURENDA, P.; ZEMAN, V.Privacy- preserving security solution for cloud services.Journal of Applied Research and TechnologyJART
2014/11/14MALINA, L.; VIVES-GUASCH, A.; CASTELLA-ROCA, J.; VIEJO, A.; HAJNÝ, J. Efficient Group Signatures for Privacy- Preserving Vehicular NetworksTelecommunication SystemsSpringer
2014/11/03HAJNY, J.; DZURENDA, P.; MALINA, L.Privacy-PAC: Privacy-Enhanced Physical Access ControlCCS 2014, Scottsdale, USAACM
2014/08/27HAJNY, J.; MALINA, L.; TETHAL, O.Privacy-Friendly Access Control Based on Personal Attributes IWSEC 2014, Hirosaki, JapanSpringer
2013/11/27MARTINASEK, Z.; HAJNY, J.; MALINA, L.Optimization of Power Analysis Using Neural NetworkCARDIS 2013, Berlin, GermanySpringer
2013/10/21Malina, L., Clupek, V., Martinasek, Z., Hajny, J., Oguchi, K., Zeman, V.Evaluation of Software-Oriented Block Ciphers
on Smartphones.
In Foundations and Practice of Security, FPS 2013, La Rochelle, FranceSpringer
2013/09/12HAJNY, J.; MALINA, L.; MARTINASEK, Z.; TETHAL, O.Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-cards and Smart-phonesESORICS DPM 2013, Egham, UKSpringer
2013/08/31MALINA, L.; HAJNY, J.Privacy-preserving framework for geosocial applicationsSecurity and Communication NetworksWiley
2013/08/30MALINA, L.; HAJNY, J.Efficient modular multiplication for programmable smart-cardsTelecommunication SystemsSpringer
2013/07/30MALINA, L.; HAJNY, J.; MARTINASEK, ZEfficient Group Signatures with Verifier- local Revocation Employing a Natural Expiration.Secrypt 2013, Reykjavik, IcelandTo be added
2013/07/30HAJNY, J.; MALINA, L.; MARTINASEK, Z.; ZEMAN, V.Privacy-preserving SVANETsSecrypt 2013, Reykjavik, IcelandSCITEPRESS
2012/12/11HAJNY, J.; MALINA, L.Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-CardsCARDIS 2012, Graz, AustriaSpringer
2012/10/02HAJNY, J.; MALINA, L.Anonymous Credentials with Practical RevocationSecurity and Privacy Special Track at the IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)IEEE
2012/10/25MALINA, L.; CASTELLA-ROCA, J.; VIVES-GUASCH, A.; HAJNY, J.Short-term Linkable Group Signatures with Categorized Batch VerificationThe Foundations & Practice of Security (FPS) Symposium 2012, Montreal, CanadaSpringer
2012/10/21MALINA, L.; HAJNY, J.; ZEMAN, V.Group Signatures for Secure and Privacy Preserving Vehicular Ad Hoc NetworksThe 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Paphos, CyprusACM
2012/09/03HAJNY, J.; MALINA, L.Practical Revocable Anonymous Credentials13th Joint IFIP TC6 and TC11 Conference on
Communications and Multimedia Security - CMS 2012, Canterbury, UK
Springer
2011/18/18MALINA, L.; HAJNY, J.Accelerated Modular Arithmetic for Low- Performance Devices34th International Conference on Telecommunications and Signal Processing, Budapest, HungaryIEEE
2011/07/18HAJNY, J.; MALINA, L.; ZEMAN, V.Practical Anonymous Authentication: Designing Anonymous Authentication for Everyday UseSecrypt 2011, Seville, SpainDBLP
2011/07/12HAJNY, J.; ZEMAN, V.Anonymous Authentication with Spread RevelationCryptologiaTaylor & Francis

Software List

  • Software: Modular Arithmetic Library for .NET Cards 
  • Software: Experimental Implementation of Modular Arithmetic Operations on the MultOS Smart Cards
  • Software: Secured Client – Server Messenger with Scalable Authentication
  • Software: Attribute Authentication Verifier for Smartphones
  • Software: Attribute Authentication Client for iOS
  • Software: DPA Contest v4 Attack
  • Software: Group Signatures Library
  • Software: IKE_PSK_SAM_v1
  • Software: libABC
  • Software: Android mobile application for access control system
  • Software: Smart Card Based Authentication Software
  • Software: Secure Access Module Based Authentication – Verifier Software
  • Software: Symmetric encryption on the FPGA card
  • Hardware cryptographic demonstrator
  • Cryptographic objects as externs in Netcope P4 compiler
  • Verification framework for user systems with integrated cryptographic P4 externs

  • Software: Modular Arithmetic Library for .NET Cards

    Authors

    Ing. Lukas Malina (malina@vut.cz)
    Ing. Jan Hajny (hajny@vut.cz)

    Download

    It is possible to download the software (limited version) here.

    Read more

    Publication to be cited

    MALINA, L.; HAJNY, J. Accelerated Modular Arithmetic for Low-Performance Devices. In 34th International Conference on Telecommunications and Signal Processing (TSP 2011). 2011 s. 1-5. ISBN: 978-1-4577-1409-2.

    Project

    The software (Modular Arithmetic Library for .NET Cards) was sponsored by the Technology Agency of the Czech Republic (project TA02011260).

    Description

    The implemented Modular Arithmetic Library provides  basic mathematical operations such as addition, subtraction, multiplication, and exponentiation of large integers (from 0 to 1024 bits -limited version, to 2048 bits –full version) on the .NET Smart Cards. The library brings the missing arithmetic operations with large integers onto the .NET Smart Card platform that allows to build own algorithms which require modular arithmetic. The examples of such algorithms are advanced cryptographic schemes, anonymous authentication systems, etc.  Also, the library includes an efficient algorithm for multiplication of large integers. The library (full version) uses advanced algorithms to achieve efficient multiplication of numbers in the range 0 to 2048 bitlength, see results in the related citation.

    The graphical user interface (developed in C#/.NET 3.5) is used for testing and verification of implemented operations. You can test the time-performance of individual operations that are calculated by the library on a smart card using the implemented modular arithmetic algorithms. These methods within the library have a public access modifier, so the methods may be used by other applications.

    In the package, you can find a test application with graphical user interface (Program.exe), and the compiled library implementation with modular arithmetic (Server.exe) which is ready to be imported on a smart card. For more detailed instructions about installation and operation see the Read Me document inside in zip file.

    If you are interested in more info, please contact authors.

    License

    This software is licensed as closed source software under exclusive legal right of the copyright holder. The software is free for personal use only. For more information about the license, please contact:

    Technology Transfer Office Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: Experimental Implementation of Modular Arithmetic Operations on the MultOS Smart Cards

    Authors

    Ing. Lukas Malina (malina@vut.cz)
    Ing. Jan Hajny (hajny@vut.cz)

    Download

    It is possible to download the software here.

    Read more


    Project

    The software was sponsored by the Technology Agency of the Czech Republic (project TA02011260).

    Description

    This software consists of the main application with a graphical user interface and a test implementation of modular arithmetic operations running on MultOS cards. The test implementation is developed in C language, limited to the platform MultOS.

    The main program (developed in Java) provides a user interface for communication with the chip cards, MultOS or JAVA. The aim is to provide middleware which ensures the communication between the card reader and chip card. The user can put data directly into the graphical user interface and display the results processed on the card. The main program is used as a handler for calling the methods of application that is imported on the Multos smart card. Either contact or non-contact smart cards are supported.

    The application also offers testing of modular arithmetic operations on chosen MultOS cards. These operations running on the card are measured and the results are used as reference points for the further optimization of these operations run on the MultOS smart cards.

    In this software package, you can find the main application with a graphical user interface (dir: dist Multos_M.jar) and two compiled test implementations in two versions for contact cards (dir: CARDC0) and non-contact cards (dir: CARDCL). The test implementation of attribute authentication is marked aa719. The test implementation of modular arithmetic is marked ma719. alu.

    For both test implementations, individual certificates for loading (*.ALR) and deleting (*.ADR) are attached to the contact and non-contact card MultOS versions. To import a test implementation (alu), we recommend to download the freely available utility Mutil (http://www.multos.com/developer_centre/tools_and_sdk/), where you can import the  *.alu  along with the certificate *.ALR using the “load live”. For more detailed instructions about installation and operation, see document Read Me inside in zip file.

    If you are interested in more info, please contact authors.

    License

    This software is licensed as closed source software under exclusive legal right of the copyright holder. The software is free for personal use only. For more information about the license, please contact:
    Technology Transfer Office
    Brno University of Technology
    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: Secured Client – Server Messenger with Scalable Authentication

    Authors

    Ing. Lukas Malina (malina@vut.cz)
    Ing. Zdenek Martinasek (martinasek@vut.cz)

    Read more


    Project

    The software was sponsored by the project FR-TI4/647.

    Description

    This
    software provides the secure client-server transmission of messages,
    the scalable authentication of entities (a client and a server), a
    secret key establishment and the variable encryption of transmitted
    data. The software is developed in JAVA and consists of two applications
    with graphical user interfaces. The application Client represents a
    client device (a remote PC, an external adapter, etc.) which is securely
    connected to an integration server. Client can securely communicate
    through the TCP / IP protocol. The application Server represents the
    integration server that authenticates clients, collects income messages
    and sends response messages. The software supports three protocols of
    authentication: the light version (a HOTP method), the medium version (a
    HOPT method and a key exchange via using asymmetric cryptography) and
    the robust version (certificates and a key exchange via using asymmetric
    cryptography).


    If you are interested in more info, please contact authors.

    License

    This software is used by TTC Telekomunikace s. r. o. as the result of
    research project FR-TI4/647. For more information about the license,
    please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: Attribute Authentication Verifier for Smartphones

    Authors

    Ing. Lukas Malina (malina@vut.cz)
    Ing. Jan Hajny (hajny@vut.cz)

    Download

    It is possible to download the software (version 0.9) here.

    Read more

    Publication to be cited

    [1]
    HAJNY, J.; MALINA, L. Unlinkable Attribute-Based Credentials with
    Practical Revocation on Smart- Cards. In Smart Card Research and
    Advanced Applications. Lecture Notes in Computer Science. LNCS. Berlin:
    Springer- Verlag, 2013. pp. 62-76. ISBN: 978-3-642-37287- 2. ISSN: 0302-
    9743.

    Project

    The software was sponsored by the project FEKT-S-11-15.

    Description

    This
    software consists of two applications, the Verifier and the Client. The
    Verifier is the main application with a graphical user interface. The
    software serves especially as a tool for a verifier entity in the
    attribute authentication system [1]. The verifier can verify personal
    attributes that serve as client’s authentication tokens to access a
    service. Basic principle is depicted in Figure 1. Attribute
    authentication systems allow the verification of individual clients
    without any loss of their personal information. The full description of
    the system and the proposed cryptographic scheme can be found in our
    publication [1]. The software also contains the client application with a
    graphical user interface developed on the Android platform.


    Figure 1. Use-case example of attribute authentication system.

    The
    verifier application provides three communication interfaces for the
    authentication of clients. The communication interfaces are NFC
    peer-to-peer communication, QR codes scanning and smart cards scanning
    via NFC. The first communication interface provides the peer-to-peer
    transmission of authentication attributes from the client to the
    verifier via short NFC messages. This transmission is possible only if
    the client uses a smartphone with a NFC module. NFC connection works
    only for small distances (< 4 cm). The second interface allows a data
    transmission using QR codes. This transmission is suitable for cases
    where the client does not have a smartphone with NFC. The successful
    transfer of QR codes depends on the quality of a camera (resolution,
    zooming, …), and a good visibility between the camera and the display
    with the QR code. The third communication interface scans chip cards
    (smartcards) via NFC module.

    If you are interested in more info, please contact authors.

    License

    In case of interest in these applications, please contact authors.
    This software is licensed as closed source software under exclusive
    legal right of the copyright holder. The software is free for personal
    use only. For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: Attribute Authentication Client for iOS

    Authors

    Ing. Jan Hajny (hajny@vut.cz)
    Ing. Lukas Malina (malina@vut.cz)

    Download

    It is possible to download the software (version 0.9) here.

    Read more

    Publication to be cited

    [1] HAJNY, J.; MALINA, L. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart- Cards. In Smart Card Research and Advanced Applications. Lecture Notes in Computer Science. LNCS. Berlin: Springer- Verlag, 2013. pp. 62-76. ISBN: 978-3-642-37287- 2. ISSN: 0302-9743.

    Project

    The software was sponsored by the project FEKT-S-11-15.

    Description

    The package contains the complete Xcode project of a client app that allows users to be anonymously verified as valid attribute holders. The app generates a QR code with necessary cryptographic values. The code is scanned and checked by the Verifier’s app.

    If you are interested in more info, please contact authors.

    License

    The software is free for personal use only. For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: DPA Contest v4 Attack

    Authors

    Ing. Zdeněk Martinásek, Ph.D. (martinasek@vut.cz)
    Ing. Ondřej Zapletal
    Ing. Lukáš Malina, Ph.D. (malina@vut.cz)

    Download

    It is possible to download the software here.

    Read more

    Publication to be cited

    [1]
    MARTINÁSEK, Z.; HAJNÝ, J.; MALINA, L. Optimization of Power Analysis
    Using Neural Network. In Smart Card Research and Advanced Applications,
    Lecture Notes in Computer Science. Springer, 2014. s. 94-107. ISBN:
    978-3-319-08302- 5.

    Project

    The software
    (DPA_Contest_attack) was sponsored by the Ministry of Industry and Trade
    of the Czech Republic (project FR-TI4/647).

    Description

    This
    program realizes a power analysis attack for the DPA contest v4
    (http://www.dpacontest.org/v4/index.php). Target implementation is a
    masked AES-256 implemented in software on an Atmel ATMega-163 smart
    card. This implementation is called AES-256 RSM (Rotating Sbox Masking).
    Our implementation of the attack consists of two basic steps (see
    Fig.1). In the first step, the secret offset of AES RSM is revealed by
    MLP (Multi-Layer Perceptron) trained from power traces. In the second
    step, the classical differential power analysis (DPA) based on a
    correlation coefficient reveals a secret key stored in a cryptographic
    device. A target intermediate value during DPA is the output of the
    SubBytes function in the first round. The attack requires about 20 power
    traces to obtain the secret key.


    In
    the zip package, you can find an executable console application
    (DPA_Contest_attack.exe), source m-files (one for linux and one for
    windows) and an installation package. For more detailed instructions
    about the installation and running of this program see the ReadMe.txt
    document inside in the zip file.

    If you are interested in more info, please contact authors.

    License

    This
    software is licensed as the closed source software under the exclusive
    legal right of the copyright holder. The software is free for personal
    use only. For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: Group Signatures Library

    Authors

    Ing. Jan Hajny (hajny@vut.cz)
    Ing. Lukas Malina (malina@vut.cz)
    Ing. Petr Dzurenda
    Martin Jaros
    Lukas Pohanka

    Download

    It is possible to download the library (limited version) here.

    Read more

    Publication to be cited

    [1]
    HAJNÝ, J.; DZURENDA, P.; MALINA, L. Privacy-Enhanced Data Collection
    Scheme for Smart-Metering. In Proceedings of the International
    Conference on Information Security and Cryptology. Lecture Notes in
    Computer Science. 2015. p. 1-18. ISSN: 0302-9743.

    Project

    The software was sponsored by the Technology Agency of the Czech Republic (project TA03010818).

    Description

    The
    software library (libGS) written in the C language enables the
    calculation of the group signature and its verification (demo version).
    Group signatures ensure data security, nonrepudation and also protects
    the privacy of signers. The library is suitable for use on both sides
    the client (the device) and the server side. The public API of the full
    version provides the following functionality: the assignment of system
    parameters of the defined values, generating client and server parts of
    the private key (the key has 2 parts), the generation and validation of
    group signatures and generating the revocation token.

    If you are interested in more info, please contact the main author (hajny@vut.cz).

    License

    The software is free for personal use only. For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software for authentication module using the protected storage IKE_PSK_SAM_v1

    Authors

    Ing. Lukáš Malina, Ph.D. (malina@vut.cz)
    Ing. Zdeněk Martinásek, Ph.D. (martinasek@vut.cz)

    Download

    It is possible to download the demo version here.

    Read more

    Publication to be cited

    TBA

    Project

    The software (IKE_PSK_SAM_v1) was sponsored by the Ministry of the Interior of the Czech Republic (project VI20162018036).

    Description

    The
    main features of the software is to verify the authenticity of the data
    by using a pre-shared secret key on a smart card programmable and
    provide the calculation of the encryption keys for the IPSec protocol.
    Smart card hosts critical operations and secret parameters. These
    operations are performed in this secure storage. The JAVA application
    Card Handler (PC) is created in order to establish APDU communication
    with a smart card via a USB interface-based reader. The application
    presents the graphical user interface for the applet on a smart card.

    In
    the zip package, you can find an executable GUI JAVA application
    (Java_Card_Handler.exe) and java card applet (for java card with JCAPI
    2.2.2 or newer). For more detailed instructions about the installation
    and running of this program see the ReadMe.txt document inside in the
    zip file.

    If you are interested in more info, please contact authors.

    License

    This
    software is licensed as the closed source software under the exclusive
    legal right of the copyright holder. The software is free for personal
    use only. For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: libABC

    Authors

    Ing. Petr Dzurenda (dzurenda@vut.cz)
    doc. Ing. Jan Hajný, Ph.D. (hajny@vut.cz)

    Download

    It is possible to download the software here.

    Read more

    Project

    The software was sponsored by the project GACR GP14-25298P

    Description

    This
    software implements group signatures HM12, Schnorr Signature, Weak-BS
    signature and efficient proof of knowledge of Weak-BS signature. The
    software allows benchmarking of these signatures. For more info read the
    manual.

    If you are interested in more info, please contact authors.

    License

    For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: Android mobile application for access control system

    Authors

    Ing. Petr Dzurenda (dzurenda@vut.cz)
    doc. Ing. Jan Hajný, Ph.D. (hajny@vut.cz)

    Download

    To get the software, please contact IMA, s.r.o.

    Read more

    Project

    The software was sponsored by the project TAČR TA04010476.

    Description

    This software implements user authentication protocols for access control systems using a mobile phone.

    If you are interested in more info, please contact authors.

    License

    For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Software: Smart Card Based Authentication Software

    Authors

    Ing. Lukáš Malina, Ph.D. (malina@vut.cz),
    Ing. Petr Dzurenda (dzurenda@vut.cz),
    Ing. David Smékal (smekald@vut.cz),
    Ing. Jakub Konečný (xkonec58@vut.cz),
    Ing. Švehlák Milan (milansvehlak@gmail.com),
    Doc. Ing. Jan Hajný, Ph.D. (hajny@vut.cz),
    prof. Ing. Kamil Vrba, CSc. (vrbak@vut.cz)

    Download

    To get the free demo version for non-commercial purposes, please contact the corresponding author (Lukas Malina, email: malina@vut.cz).
    To get the full version for commercial purposes, please contact the corresponding author (Lukas Malina, email: malina@vut.cz).

    Read more

    Project

    This software was financed by the Ministry of Interior under grant VI20162018003.

    Description

    The
    software “Smart Card Based Authentication Software” implements an
    advanced authentication protocol for access control systems based on
    smart card platforms (Basic Cards and MultOS Cards). The authentication
    protocol is based on a zero-knowledge protocol and provides strong
    security level (NIST 2016-2030 and beyond). The protocol on the cards
    provides 8 security versions including ECC versions (ECC up to 512b).
    The user with smart cards with installed card applications can be
    verified via USB card readers by the JAVA Smart card handler application
    that run on PC.
    On this site, we present a description of software
    that contains runnable JAVA application providing basic graphical user
    interface (see a figure below) and two compiled Multos card application
    (version ECC 256) for developer Multos cards. The full version is
    protected under a license and is available on demand (please use the
    contact email). The full version contains runnable JAVA application,
    compiled Multos card applications for all versions and Basic card
    application supporting all protocol versions (1024, 2048, 3072, ECC192,
    ECC 224, ECC 256, ECC 384, ECC 512). For further information about card
    compatibilities and GUI please read read-me files inside the SW package.
    The main parts of SW package are:
    – GUI JAVA application: Smart card handler application – Manager
    – Basic Card application (all versions in one app) *only in full version
    – Multos Card applications (two apps for v3072 and other versions)
    o mvcr-ima-2017-USER-v3072.alu
    o mvcr-ima-2017-USER.alu
    – read me files and supported SW for upload app on the Multos Cards

    If you are interested, please contact the correspond author: Lukas Malina (malina@vut.cz).


    License

    For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Secure Access Module Based Authentication – Verifier Software

    Authors

    Ing. Lukáš Malina, Ph.D. (malina@vut.cz),
    Ing. Petr Dzurenda (dzurenda@vut.cz),
    Ing. Pavel Kristof (pavel.kristof@ima.cz),
    Ing. Vlastimil Beneš (vlastimil.benes@ima.cz),
    Ing. Jakub Frolka (frolka@vut.cz),
    Ing. Tomáš Lieskovan (tomas.lieskovan@vut.cz),
    prof. Ing. Kamil Vrba, CSc. (vrbak@vut.cz)

    Download

    To get the free demo version for non-commercial purposes, please contact the corresponding author (Lukas Malina, email: malina@vut.cz).
    To get the full version for commercial purposes, please contact the corresponding author (Lukas Malina, email: malina@vut.cz).

    Read more

    Project

    This software was financed by the Ministry of Interior under grant VI20162018003.

    Description

    The
    software “Secure Access Module Based Authentication – Verifier
    Software” implements an advanced authentication protocol for access
    control systems that use smart cards on the user and verifier sides. The
    software provides mainly the application for SAM that runs on the
    verifier side and provides the necessary functionality to authenticate
    users with smart cards (Basic Cards and MultOS Cards). The implemented
    authentication protocol is based on the zero knowledge protocol and
    provides a strong level of security (NIST 2016-2030 and beyond). The
    protocol in SAM contains 8 versions for different security levels,
    including ECC versions (ECC to 512b). The verifier uses the SAM module
    on which the created application for the contact chip cards runs, and
    through a graphical user interface application, it can authenticate a
    user with a smart card. The authentication JAVA application uses the
    available USB card readers and provides communication and graphical
    presentation of the results during the authentication process.
    On
    this site, we publish a description of software that contains runnable
    JAVA application – SAM Verifier providing basic graphical user interface
    (see a figure below), one compiled SAM application for Multos Cards and
    two testing compiled Multos card applications for user side with
    developer Multos cards. The full version is protected under a license
    and is available on demand (please use the contact email). The full
    version contains runnable JAVA application – SAM Verifier, compiled SAM
    Multos card applications for all versions and SAM Basic card application
    supporting all protocol versions (1024, 2048, 3072, ECC192, ECC 224,
    ECC 256, ECC 384, ECC 512) and testing user smart card applications
    (Multos and Basic). For further information about card compatibilities
    and GUI please read read-me files inside the SW package.
    The main parts (5 apps + readme) of SW package are:
    – GUI JAVA application: SAM handler application – Verifier
    – SAM Basic Card application (all versions in one app) *only in full version
    – SAM Multos Card applications (two apps for v3072 and other versions)
    o mvcr-ima-2017-SAM-v256.alu
    o mvcr-ima-2017-SAM.alu*only in full version
    – Basic Card application for a user (all versions in one app) *only in full version
    – Multos Card applications for a user (two apps for v3072 and other versions)
    o mvcr-ima-2017-USER-v3072.alu
    o mvcr-ima-2017-USER.alu
    – read me files and supported SW for upload app on the Multos Cards

    If you are interested, please contact the correspond author: Lukas Malina (malina@vut.cz).


    License

    For more information about the license, please contact:

    Technology Transfer Office
    Brno University of Technology

    E-mail: info@tt.vutbr.cz
    http://www.vutbr.cz/utt

    Read less


    Symmetric encryption on the FPGA card

    Authors

    Ing. David Smékal (smekal@vut.cz)
    Ing. Zdeněk Martinásek, Ph.D. (martinasek@vut.cz)
    Ing. Lukáš Malina, Ph.D. (malina@vut.cz)
    doc. Ing. Jan Hajný, Ph.D. (hajny@vut.cz)
    prof. Ing. Kamil Vrba, CSc. (vrbak@vut.cz)
    Ing. Denis Matoušek (matousek@netcope.com)

    Download

    To get the software, please contact Netcope Technologies, a.s. (info@netcope.com).

    Read more

    Project

    This software was financed by the Ministry of Interior under grant VI20162018036.

    Description

    The
    software implements the AES (Advanced Encryption Standard) algorithm
    for FPGAs (Field Programmable Gate Array) in the VHDL (Hardware
    Description Language) programming language. The software contains of the
    cryptographic core of the AES algorithm using a 128-bit key in GCM mode
    (Galois/Counter Mode). This implementation is based on the 4 duplicated
    encryption cores and employs pipelined processing in order to achieve
    full 100 Gbps encryption speed. The design is implemented and verified
    on the acceleration card NFB-100G2Q.

    If you are interested, please contact the correspond author: Zdeněk Martinásek (martinasek@vut.cz).

    License

    For more information about the license, please contact:

    To get the software, please contact Netcope Technologies, a.s. (info@netcope.com).

    Read less


    Hardware cryptographic demonstrator

    Authors

    Ing. David Smékal (smekald@vut.cz)
    Ing. Petr Jedlička (xjedli23@vut.cz)
    doc. Ing. Lukáš Malina, Ph.D. (malina@vut.cz)
    Ing. Pavel Šeda, Ph.D. (sedap@vut.cz)
    Ing. Patrik Dobiáš (xdobia13@vutbr.cz)
    prof. Ing. Kamil Vrba, CSc. (vrbak@vut.cz)
    Ing. Peter Cíbik (xcibik00@vutbr.cz / cibik@magmio.com)
    Ing. Jakub Hrabovský (hrabovsky@magmio.com)

    Download

    To get the software, please contact MAGMIO, a.s. (info@magmio.com).

    Read more

    Project

    This software was financed by the Ministry of Interior under grant VI20192022126.

    Description

    The software represents a library of cryptographic primitives for the FPGA platform as P4 externs (short name: Hardware cryptographic demonstrator; designation: CRYPTOACCEL). It is an implementation of all basic cryptographic mechanisms (i.e. symmetric block ciphers, asymmetric digital signature, hash function and postquantum digital signature) on the FPGA platform in VHDL (VHSIC Hardware Description Language) so that they can be used modularly as externs in language P4, which will allow them to be easily used even by users lacking experience in hardware development, without a negative effect on the performance of the implementation.

    If you are interested, please contact the correspond author: Lukáš Malina (malina@vut.cz).

    License

    For more information about the license, please contact:

    To get the software, please contact Magmio, a.s. (info@magmio.com).

    Read less


    Cryptographic objects as externs in Netcope P4 compiler

    Authors

    Ing. Peter Cíbik (xcibik00@vutbr.cz / cibik@magmio.com)
    Bc. Petr Ohnút (ohnut@magmio.com)
    Mychajlo Novikov (novikov@magmio.com)
    Ing. Jakub Hrabovský, Ph.D. (hrabovsky@magmio.com)

    Download

    To get the software, please contact MAGMIO, a.s. (info@magmio.com).

    Read more

    Project

    This software was financed by the Ministry of Interior under grant VI20192022126.

    Description

    The software represents a solution for support of various cryptographic objects as P4 externs in Netcope P4 compiler. The solution provides the interface specification and implementation of top modules as well as wrappers in VHDL (VHSIC Hardware Description Language) for each of the common cryptographic primitives (symmetric cipher AES-GCM-256, asymmetric digital signature EdDSA, keyed-hash message authentication code HMAC-SHA3-512, hash functions SHA3-256 and SHA3-512) in order to integrate them into P4 pipeline through Netcope P4 compiler. Furthermore, this extension allows users to integrate their own implementations of various cryptographic primitives into Netcope P4 compiler in the form of cryptographic externs, which can be then directly used in P4 source code.

    If you are interested, please contact the Magmio a.s. (info@magmio.com).

    License

    For more information about the license, please contact:

    To get the software, please contact Magmio, a.s. (info@magmio.com).

    Read less


    Verification framework for user systems with integrated cryptographic P4 externs

    Authors

    Ing. Peter Cíbik (xcibik00@vutbr.cz / cibik@magmio.com)
    Bc. Petr Ohnút (ohnut@magmio.com)
    Mychajlo Novikov (novikov@magmio.com)
    Ing. Jakub Hrabovský, Ph.D. (hrabovsky@magmio.com)

    Download

    To get the software, please contact MAGMIO, a.s. (info@magmio.com).

    Read more

    Project

    This software was financed by the Ministry of Interior under grant VI20192022126.

    Description

    The software represents a set of tools for automatic verification of FPGA firmware created by Netcope P4 compiler in the translation process of user P4 source code, which contains any of the supported cryptographic externs. Verification framework supports all common cryptographic primitives (symmetric cipher AES-GCM-256, asymmetric digital signature EdDSA, keyed-hash message authentication code HMAC-SHA3-512, hash functions SHA3-256 and SHA3-512). Framework includes a tool for automatic generation of testing samples exported into pcap files with the usage of reference implementations of related cryptographic functions, a tool for detailed comparison of various samples, a tool for automatic build of FPGA firmware, and main tool for automatic functional verification of FPGA firmware directly in the FPGA card. Verification of any custom system with cryptographic externs in P4 becomes simple by the application of the listed tools included in the framework without a need for any knowledge of FPGA technology

    If you are interested, please contact the Magmio a.s. (info@magmio.com).

    License

    For more information about the license, please contact:

    To get the software, please contact Magmio, a.s. (info@magmio.com).

    Read less