Martin Novotný

Position
Assistant Professor
Research Interests
Cryptography, Embedded systems, Digital design, Arithmetics
Room
A-1033
Address

Thákurova 2077/7
Praha

Biography

Martin Novotný graduated in electrical engineering from the Czech Technical University in Prague, the Czech Republic, in 1992. He received his Ph.D. degree in information security from Ruhr-University Bochum, Germany, in 2009.

He is an Assistant Professor and the Head of the Embedded Security Lab at the Czech Technical University in Prague. He serves as a member of the editorial board of Microprocessors and Microsystems journal and a program committee member in several international conferences focusing on cryptography and digital design. He was a program co-chair of DSD 2017, a program chair of DSD 2018, a general chair of CARDIS 2019, and a general co-chair of CHES 2023 conference. He is an author or co-author of 80+ journal and conference papers and book chapters. His research interests include arithmetic units, hardware for cryptography and cryptanalysis, efficient implementation of cryptographic algorithms, and embedded systems.

Dr. Novotný is a member of the IACR society.

Publications

2024

  • Daněk, L., & Novotný, M. (2024, August). How Primitive but How Effective: Fault-Injection Attack on Cryptographic Accelerator of Microchip CEC 1702 Microcontroller. In 2024 27th Euromicro Conference on Digital System Design (DSD) (pp. 129-136). IEEE Computer Soc. [pdf]

2023

  • Horníčková, T., Přeučil, T., Novotný, M. & Martinásek, Z. (2023, June). Side-Channel Analysis of Cryptographic Processor CEC 1702. In 2023 12th Mediterranean Conference on Embedded Computing (MECO) (pp. 178-181). IEEE. [doi] [pdf]
  • Pokorný, D., Novotný, M. (2023, June). Introduction to Probing Security. In Proceedings of the 11th Prague Embedded Systems Workshop (p. 9). CTU FIT, Department of Digital Design.
  • Pokorný, D., Socha, P., Novotný, M. (2023, July). Equivalent Keys as a Side-Channel Countermeasure for the Rainbow Signature Scheme. In Proceedings of the 11th Prague Embedded Systems Workshop (p. 34). CTU FIT, Department of Digital Design.
  • Přeučil, T., & Novotný, M. (2023, June). Surveying the security of access systems in Uppsala, Sweden. In 2023 12th Mediterranean Conference on Embedded Computing (MECO) (pp. 129-133). IEEE. [doi] [pdf]

2022

  • Mašek, V., & Novotný, M. (2022, April). Versatile Hardware Framework for Elliptic Curve Cryptography. In 2022 IEEE 25th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS) (pp. 80-83). IEEE. [doi] [pdf]
  • Pokorný, D., Socha, P., & Novotný, M. (2022). Equivalent Keys: Side-Channel Countermeasure for Post-Quantum Multivariate Quadratic Signatures. Electronics, 11, 3607. [doi] [pdf]
  • Přeučil, T., Socha, P., & Novotný, M. (2022, August). Implementation of the Rainbow signature scheme on SoC FPGA. In 2022 25th Euromicro Conference on Digital System Design (DSD) (pp. 513-519). IEEE Computer Soc. [doi] [pdf]
  • Socha, P., Miškovský, V., & Novotný, M. (2022). A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis. Sensors, 22, 8096. [doi] [pdf]
  • Socha, P., Miškovský, V., & Novotný, M. (2022, June). A fair experimental evaluation of distance correlation side-channel distinguisher. In 2022 11th Mediterranean Conference on Embedded Computing (MECO) (pp. 110-113). IEEE. [doi] [pdf]

2021

  • Balihar, T., & Novotný, M. (2021, June). Influence of Synthesis Parameters on Vulnerability to Side-Channel Attacks. In 2021 10th Mediterranean Conference on Embedded Computing (MECO) (pp. 735-740). IEEE. [doi] [pdf]
  • Miškovský, V., Kubátová, H., & Novotný, M. (2021, September). Secure and dependable: Area-efficient masked and fault-tolerant architectures. In 2021 24th Euromicro Conference on Digital System Design (DSD) (pp. 333-338). IEEE Computer Soc. [doi] [pdf]
  • Pokorný, D., Socha, P., & Novotný, M. (2021, February). Side-channel attack on Rainbow post-quantum signature. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 565-568). IEEE. [doi] [pdf]
  • Socha, P., Miškovský, V., & Novotný, M. (2021). High-level synthesis, cryptography, and side-channel countermeasures: A comprehensive evaluation. Microprocessors and Microsystems, 85, 104311. [doi]

2020

  • Klemsa, J., & Novotný, M. (2020, July). Exploiting Linearity in White-Box AES with Differential Computation Analysis. In Science and Information Conference (pp. 404-419). Springer, Cham. [doi] [pdf]
  • Klemsa, J., & Novotný, M. (2020, June). WTFHE: neural-netWork-ready Torus Fully Homomorphic Encryption. In 2020 9th Mediterranean Conference on Embedded Computing (MECO) (pp. 1-5). IEEE. [doi] [pdf]
  • Moucha, P., Jeřábek, S., & Novotný, M. (2020, April). Novel Dummy Rounds Schemes as a DPA Countermeasure in PRESENT Cipher. In 2020 IEEE 23rd International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS) (pp. 1-4). IEEE. [doi] [pdf]
  • Moucha, P., Jeřábek, S., & Novotný, M. (2020, August). Novel Controller for Dummy Rounds Scheme DPA Countermeasure. In 2020 23rd Euromicro Conference on Digital System Design (DSD) (pp. 281-284). IEEE Computer Soc. [doi] [pdf]
  • Socha, P., & Novotný, M. (2020, August). Towards High-Level Synthesis of Polymorphic Side-Channel Countermeasures. In 2020 23rd Euromicro Conference on Digital System Design (DSD) (pp. 193-199). IEEE Computer Soc. [doi] [pdf]
  • Socha, P., Brejník, J., Balasch, J., Novotný, M., & Mentens, N. (2020). Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware. Microprocessors and Microsystems, 78, 103208. [doi]

2019

  • Říha, J., Klemsa, J., & Novotný, M. (2019, June). Multiprecision ANSI C Library for Implementation of Cryptographic Algorithms on Microcontrollers. In 2019 8th Mediterranean Conference on Embedded Computing (MECO) (pp. 1-4). IEEE. [doi] [pdf]
  • Socha, P., Brejník, J., Jeřábek, S., Novotný, M., & Mentens, N. (2019, August). Dynamic Logic Reconfiguration Based Side-Channel Protection of AES and Serpent. In 2019 22nd Euromicro Conference on Digital System Design (DSD) (pp. 277-282). IEEE Computer Soc. [doi] [pdf]
  • Socha, P., Miškovský, V., & Novotný, M. (2019, June). First-Order and Higher-Order Power Analysis: Computational Approaches and Aspects. In 2019 8th Mediterranean Conference on Embedded Computing (MECO) (pp. 1-5). IEEE. [doi] [pdf]
  • Socha, P., Miškovský, V., & Novotný, M. (2019, May) SICAK: An open-source SIde-Channel Analysis toolKit. In 2019 8th Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE) [pdf]
  • Socha, P., Miškovský, V., Kubátová, H., & Novotný, M. (2019). Efficient algorithmic evaluation of correlation power analysis: Key distinguisher based on the correlation trace derivative. Microprocessors and Microsystems, 71, 102858. [doi]

2018

  • Jeřábek, S., Schmidt, J., Novotný, M., & Miškovský, V. (2018, August). Dummy rounds as a DPA countermeasure in hardware. In 2018 21st Euromicro Conference on Digital System Design (DSD) (pp. 523-528). IEEE. [doi] [pdf]
  • Mentens, N., Miskovsky, V., Novotny, M., & Vliegen, J. (2018). High-speed Side-channel-protected Encryption and Authentication in Hardware. Cryptology ePrint Archive. [pdf]
  • Miškovský, V., Kubátová, H., & Novotný, M. (2018, June). Speeding up differential power analysis using integrated power traces. In 2018 7th Mediterranean Conference on Embedded Computing (MECO) (pp. 1-5). IEEE. [doi] [pdf]
  • Socha, P., Miškovský, V., Kubátová, H., & Novotný, M. (2018, August). Correlation Power Analysis Distinguisher Based on the Correlation Trace Derivative. In 2018 21st Euromicro Conference on Digital System Design (DSD) (pp. 565-568). IEEE Computer Soc. [doi] [pdf]

2017

  • Buček, J., Novotný, M., & Štěpánek, F. (2017). Practical Session: Differential Power Analysis for Beginners. In Hardware Security and Trust (pp. 77-91). Springer, Cham. [doi] [pdf]
  • Jeřábek, S., Buček, J., Schmidt, J., & Novotný, M. (2017, June). Emulator of contactless smart cards in FPGA. In 2017 6th Mediterranean Conference on Embedded Computing (MECO) (pp. 1-4). IEEE. [doi] [pdf]
  • Mazur, L., & Novotný, M. (2017, June). Differential power analysis on FPGA board: Boundaries of success. In 2017 6th Mediterranean Conference on Embedded Computing (MECO) (pp. 1-4). IEEE. [doi] [pdf]
  • Miškovský, V., Kubátová, H., & Novotný, M. (2017). Influence of passive hardware redundancy on differential power analysis resistance of AES cipher implemented in FPGA. Microprocessors and Microsystems, 51, 220-226. [doi] [pdf]
  • Novotný, M. (2017). Cryptanalytic attacks on cyber-physical systems. Microprocessors and Microsystems, 52, 534-539. [doi] [pdf]
  • Říha, J., Miškovský, V., Kubátová, H., & Novotný, M. (2017, August). Influence of Fault-Tolerance Techniques on Power-Analysis Resistance of Cryptographic Design. In 2017 Euromicro Conference on Digital System Design (DSD) (pp. 260-267). IEEE. [doi] [pdf]
  • Socha, P., Miškovský, V., Kubátová, H., & Novotný, M. (2017, April). Optimization of Pearson correlation coefficient calculation for DPA and comparison of different approaches. In 2017 IEEE 20th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS) (pp. 184-189). IEEE. [doi] [pdf]

2016

  • Miškovský, V., Kubátová, H., & Novotný, M. (2016, June). Influence of fault-tolerant design methods on differential power analysis resistance of AES cipher: Methodics and challenges. In 2016 5th Mediterranean Conference on Embedded Computing (MECO) (pp. 14-17). IEEE. [doi] [pdf]

2013

  • Güneysu, T., Kasper, T., Novotný, M., Paar, C., Wienbrandt, L., & Zimmermann, R. (2013). High-performance cryptanalysis on RIVYERA and COPACOBANA computing systems. In High-Performance Computing Using FPGAs (pp. 335-366). Springer, New York, NY. [doi]
  • Štěpánek, F., Buček, J., & Novotný, M. (2013, September). Differential power analysis under constrained budget: Low cost education of hackers. In 2013 Euromicro Conference on Digital System Design (pp. 645-648). IEEE. [doi] [pdf]

2012

  • Pospíšil, J., & Novotný, M. (2012, April). Lightweight cipher resistivity against brute-force attack: Analysis of PRESENT. In 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS) (pp. 197-198). IEEE. [doi] [pdf]
  • Pospíšil, J., & Novotný, M. (2012, September). Evaluating cryptanalytical strength of lightweight cipher PRESENT on reconfigurable hardware. In 2012 15th Euromicro Conference on Digital System Design (pp. 560-567). IEEE. [doi] [pdf]

2011

  • Štembera, P., & Novotný, M. (2011, August). Breaking Hitag2 with reconfigurable hardware. In 2011 14th Euromicro Conference on Digital System Design (pp. 558-563). IEEE. [doi] [pdf]

2009

  • Novotný, M., & Kasper, T. (2009). Cryptanalysis of KeeLoq with COPACOBANA. In Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS 2009) (pp. 159-164). [pdf]

2008

  • Gendrullis, T., Novotný, M., & Rupp, A. (2008, August). A real-world attack breaking A5/1 within hours. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 266-282). Springer, Berlin, Heidelberg. [doi] [pdf]
  • Güneysu, T., Kasper, T., Novotný, M., Paar, C., & Rupp, A. (2008). Cryptanalysis with COPACOBANA. IEEE Transactions on computers, 57(11), 1498-1513. [doi]

2007

  • Novotný, M., & Schmidt, J. (2007, August). General digit-serial normal basis multiplier with distributed overlap. In 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2007) (pp. 94-101). IEEE. [doi] [pdf]

2006

  • Novotný, M., & Schmidt, J. (2006, April). Normal Basis Multipliers of General Digit Width Applicable in ECC. In 2006 IEEE Design and Diagnostics of Electronic Circuits and systems (pp. 143-144). IEEE. [doi]
  • Novotný, M., & Schmidt, J. (2006, August). General digit width normal basis multipliers with circular and linear structure. In 2006 International Conference on Field Programmable Logic and Applications (pp. 1-4). IEEE. [doi]
  • Novotný, M., & Schmidt, J. (2006, August). Two Architectures of a General Digit-Serial Normal Basis Multiplier. In 9th EUROMICRO Conference on Digital System Design (DSD'06) (pp. 550-553). IEEE. [doi]

2005

  • Schmidt, J., & Novotný, M. (2005). Scalable Normal Basis Arithmetic Unit for Elliptic Curve Cryptography. Acta Polytechnica, 45(2). [doi]