|
Name and surname:
|
doc. RNDr. Martin Stanek, PhD.
|
|
Document type:
|
Research/art/teacher profile of a person
|
|
The name of the university:
|
Comenius University Bratislava
|
|
The seat of the university:
|
Šafárikovo námestie 6, 818 06 Bratislava
|
| III.a - Occupation-position | III.b - Institution | III.c - Duration |
|---|---|---|
| lecturer, associate professor | Faculty of Mathematics, Physics and Informatics, Comenius University | since 1997 |
| analyst, programmer | Alfa VS s.r.o. | 1996-1997 |
| V.1.a - Name of the profile course | V.1.b - Study programme | V.1.c - Degree | V.1.d - Field of study |
|---|---|---|---|
| Cryptology (1) | Computer Science | I.+II. | Computer Science |
| Diploma Thesis Seminar (3) | Computer Science | II. | Computer Science |
| Diploma Thesis Seminar (4) | Computer Science | II. | Computer Science |
| V.5.a - Name of the course | V.5.b - Study programme | V.5.c - Degree | V.5.d - Field of study |
|---|---|---|---|
| Security Testing | Computer Science | I. | Computer Science |
| IT Infrastructure Security | Computer Science | II. | Computer Science |
Olejár D., Stanek M.
On cryptographic properties of random Boolean functions,
Journal of Universal Computer Science, 1998, 4(8), Springer, pp. 705-717
Staneková Ľ., Stanek M.
Analysis of dictionary methods for PIN selection,
Computers & Security, Volume 39, Part B, 2013, pp. 289-298
Rjaško M., Stanek M.
Attacking M&M Collective Signature Scheme,
Fundamenta Informaticae, 2012, 114(3-4):319-323
Staneková Ľ., Stanek M.
Fast Contract Signing with Batch Oblivious Transfer,
(2005) Communications and Multimedia Security, CMS 2005, Lecture Notes in Computer Science, Vol 3677, Springer
Stanek M.
Weaknesses of password authentication scheme based on geometric hashing,
International Journal of Network Security, 2016, Vol.18, No.4, pp.798-801
Ostertág R., Stanek M.
Anomaly Detection in Certificate Transparency Logs
(2024) CEUR Workshop Proceedings, 3792, pp. 190 - 196
Stanek M.
Revisiting Monte Carlo Strength Evaluation
(2024) CEUR Workshop Proceedings, 3792, pp. 197 - 202
Grochal, P., Stanek, M.
Differential MITM attacks on SLIM and LBCIoT
(2025) 24th Central European Conference on Cryptology, pp. 1 - 5
Stanek M.
Bad cipher design: Chessography and Cascaded Spin Shuffle
(2025) CEUR Workshop Proceedings, 4092, pp. 395 - 403