default search action
Pavol Zajac
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Stanislav Marochok, Pavol Zajac:
Algorithm for Generating S-Boxes with Prescribed Differential Properties. Algorithms 16(3): 157 (2023) - [j16]Pavol Zajac:
Algebraic Cryptanalysis with MRHS Equations. Cryptogr. 7(2): 19 (2023) - [j15]Eugen Antal, Pavol Zajac:
The first Czechoslovak cipher machine. Cryptologia 47(3): 239-260 (2023) - [c9]Eugen Antal, Pavol Marák, Pavol Zajac, Tünde Lengyelová, Diana Duchonová:
Encrypted Documents and Cipher Keys From the 18th and 19th Century in the Archives of Aristocratic Families in Slovakia. HistoCrypt 2023: 1-12 - 2021
- [j14]Pavol Zajac:
Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications. Sensors 21(6): 2036 (2021) - [c8]Eugen Antal, Pavol Zajac:
HCPortal Modules for Teaching and Promoting Cryptology. HistoCrypt 2021: 1-11 - [c7]Eugen Antal, Pavol Zajac, Jakub Mírka:
Solving a Mystery From the Thirty Years'War: Karel Rabenhaupt ze Such'e's Encrypted Letter to Landgravine Amalie Elisabeth. HistoCrypt 2021: 12-24 - 2020
- [j13]Pavol Zajac, Matús Jókay:
Cryptographic properties of small bijective S-boxes with respect to modular addition. Cryptogr. Commun. 12(5): 947-963 (2020) - [c6]Eugen Antal, Pavol Zajac:
HCPortal Overview. HistoCrypt 2020: 18-20 - [c5]Eugen Antal, Pavol Zajac, Otokar Grosek:
Diplomatic Ciphers Used by Slovak Attaché During the WW2. HistoCrypt 2020: 21-30
2010 – 2019
- 2019
- [j12]Pavol Zajac:
Hybrid Encryption from McEliece Cryptosystem with Pseudo-random Error Vector. Fundam. Informaticae 169(4): 345-360 (2019) - [c4]Eugen Antal, Pavol Zajac, Otokar Grosek:
Cryptology in the Slovak State During WWII. HistoCrypt 2019: 158:003 - [i6]Pavol Zajac:
Tree authenticated ephemeral keys. IACR Cryptol. ePrint Arch. 2019: 921 (2019) - 2018
- [j11]Pavol Zajac:
Using Local Reduction for the Experimental Evaluation of the Cipher Security. Comput. Informatics 37(2): 349-366 (2018) - [j10]Tomás Fabsic, Otokar Grosek, Karol Nemoga, Pavol Zajac:
On generating invertible circulant binary matrices with a prescribed number of ones. Cryptogr. Commun. 10(1): 159-175 (2018) - [j9]Håvard Raddum, Pavol Zajac:
MRHS solver based on linear algebra and exhaustive search. J. Math. Cryptol. 12(3): 143-157 (2018) - [c3]Eugen Antal, Pavol Zajac:
ManuLab System Demonstration. HistoCrypt 2018: 149:022 - [i5]Håvard Raddum, Pavol Zajac:
MRHS Solver Based on Linear Algebra and Exhaustive Search. IACR Cryptol. ePrint Arch. 2018: 111 (2018) - [i4]Tomás Fabsic, Viliam Hromada, Pavol Zajac:
A Reaction Attack on LEDApkc. IACR Cryptol. ePrint Arch. 2018: 140 (2018) - 2017
- [j8]Pavol Zajac:
Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity. Des. Codes Cryptogr. 82(1-2): 43-56 (2017) - [c2]Tomás Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson:
A Reaction Attack on the QC-LDPC McEliece Cryptosystem. PQCrypto 2017: 51-68 - [i3]Tomás Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson:
A Reaction Attack on the QC-LDPC McEliece Cryptosystem. IACR Cryptol. ePrint Arch. 2017: 494 (2017) - 2015
- [j7]Eugen Antal, Pavol Zajac:
Key Space and Period of Fialka M-125 Cipher Machine. Cryptologia 39(2): 126-144 (2015) - [c1]Michal Varchola, Milos Drutarovský, Marek Repka, Pavol Zajac:
Side channel attack on multiprecision multiplier used in protected ECDSA implementation. ReConFig 2015: 1-6 - 2014
- [j6]Pavol Zajac, Matús Jókay:
Multiplicative complexity of bijective 4×4 S-boxes. Cryptogr. Commun. 6(3): 255-277 (2014) - [i2]Pavol Zajac:
A note on CCA2-protected McEliece Cryptosystem with a systematic public key. IACR Cryptol. ePrint Arch. 2014: 651 (2014) - 2013
- [j5]Pavol Zajac:
A new method to solve MRHS equation systems and its connection to group factorization. J. Math. Cryptol. 7(4): 367-381 (2013) - 2012
- [j4]Pavol Zajac, Matús Jókay:
Computing Indexes and Periods of All Boolean Matrices Up to Dimension n=8. Comput. Informatics 31(6): 1329-1344 (2012) - [j3]Pavol Zajac:
Solving Trivium-based Boolean Equations Using the Method of Syllogisms. Fundam. Informaticae 114(3-4): 359-373 (2012) - [j2]Pavol Zajac, Radoslav Cagala:
Local reduction and the algebraic cryptanalysis of the block cipher gost. Period. Math. Hung. 65(2): 239-255 (2012)
2000 – 2009
- 2009
- [j1]Otokar Grosek, Peter Horák, Pavol Zajac:
On complexity of round transformations. Discret. Math. 309(18): 5527-5534 (2009) - [r2]Otokar Grosek, Pavol Zajac:
Automated Cryptanalysis. Encyclopedia of Artificial Intelligence 2009: 179-185 - [r1]Otokar Grosek, Pavol Zajac:
Automated Cryptanalysis of Classical Ciphers. Encyclopedia of Artificial Intelligence 2009: 186-191 - 2008
- [i1]Pavol Zajac:
Remarks on the NFS complexity. IACR Cryptol. ePrint Arch. 2008: 64 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint