Technical reports

A. Laszka, M. Felegyhazi, L. Butty√°n
A Survey of Interdependent Security Games
no. CRYSYS-TR-2012-11-15, CrySyS Lab, BME, Nov, 2012.
( Abstract, PDF, Bibtex )

B. Bencsáth, G. Pék, L. Buttyán, M. Felegyhazi
sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks
In collaboration with the sKyWIper Analysis Team , 2012.
( PDF, Bibtex )

B. Bencsáth, G. Pék, L. Buttyán, M. Felegyhazi
Duqu: A Stuxnet-like malware found in the wild
BME CrySyS Lab., October, 2011., First published in cut-down form as appendix to the Duqu report of Symantec.
( Bibtex )

B. Bencs√°th, T. Tuzson, B. T√≥th, T. Tiszai, G. Szappanos, E. Rig√≥, Sz. P√°sztor, M. P√°sztor, P. Papp, P. Orvos, P. M√°t√≥, B. Martos, L. K√ļn, Z. Kincses, T. Horv√°th, M. Juh√°sz, B. K. Erd√©lyi, A. Bog√°r, G. Vid
Az informatikai h√°l√≥zati infrastrukt√ļra biztons√°gi kock√°zatai √©s kontrolljai
IHM - MTA-SZTAKI, 2004.
( Abstract, PDF, Bibtex )

I. Zs. Berta, I. Vajda, L. Butty√°n, B. Bencs√°th, T. Veiland
HUNEID - Hungarian Electronic ID smart card specifications
Ministry of Informatics and Telecommunications (www.ihm.hu), http://www.itktb.hu/engine.aspx?page=showcontent&content=ias, 2004.
( Bibtex )

G. √Ācs, L. Butty√°n, I. Vajda
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
http://eprint.iacr.org/ under report number 2004/159., March, 2004.
( Abstract, Bibtex )

L. Butty√°n, J. P. Hubaux
Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks
no. DSC/2001/001, EPFL-DI-ICA, January, 2001.
( Abstract, PS, Bibtex )

L. Butty√°n, J. P. Hubaux
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
no. DSC/2001/046, EPFL-DI-ICA, August, 2001.
( Abstract, PS, Bibtex )

L. Butty√°n, J. P. Hubaux
Enforcing Service Availability in Mobile Ad-Hoc WANs
no. DSC/2000/025, EPFL-DI-ICA, May, 2000.
( Abstract, PDF, Bibtex )

I. Vajda, B. Bencs√°th, A. Bogn√°r
Tanulm√°ny a napvil√°gra ker√ľlt Elender jelszavakr√≥l
Apr., 2000.
( Abstract, Bibtex )

J. P. Hubaux, J. Y. Le Boudec, S. Giordano, M. Hamdi, L. Blazevic, L. Butty√°n, M. Vojnovic
Toward Mobile Ad-Hoc WANs: Terminodes
no. DSC/2000/006, EPFL-DI-ICA, February, 2000.
( Abstract, PDF, Bibtex )

L. Butty√°n, J. P. Hubaux
Accountable Anonymous Service Usage in Mobile Communication Systems
no. SSC/99/16, EPFL-DI-ICA, May, 1999.
( Abstract, PS, Bibtex )

L. Butty√°n
Formal methods in the design of cryptographic protocols (state of the art)
no. SSC/1999/38, EPFL-DI-ICA, November, 1999.
( Abstract, PS, Bibtex )

L. Butty√°n, J. P. Hubaux
Toward a Formal Model of Fair Exchange - a Game Theoretic Approach
no. SSC/1999/39, EPFL-DI-ICA, December, 1999.
( Abstract, PDF, Bibtex )

C. Gbaguidi, S. Staamann, U. Wilhelm, L. Butty√°n
A Note on an Authentication Technique Based on Distributed Security Management for the Global Mobility Network
no. SSC/98/18, EPFL-DI-ICA, April, 1998.
( Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Butty√°n
CrySTINA: Security in the Telecommunications Information Networking Architecture
no. SSC/98/4, EPFL-DI-ICA, January, 1998.
( Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Butty√°n
Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach
no. SSC/98/4, EPFL-DI-ICA, January, 1998.
( Abstract, PS, Bibtex )

L. Butty√°n, I. Vajda
On the Design of Strong Bit Permutations and Substitutions
Budapest University of Technology, January, 1997.
( Bibtex )

I. Vajda, L. Butty√°n
On the Design of Substitution-Permutation Ciphers
Budapest University of Technology, January, 1997.
( Bibtex )


Budapest University of Technology and Economics
Department of Networked Systems and Services
CrySyS - Laboratory of Cryptography and Systems Security