Publications and project dissemination

All publications, presentations, and other externally distributed materials stemming from the MYP grant shall comply with SPS Visual Identity Guidelines (provided to project co-directors) and shall credit NATO support with the following or a substantially similar sentence:

This research was sponsored [in part] by the NATO Science for Peace and Security Programme under grant G5448.


Publications

  1. COLOMBO, C. et al.: Applying Runtime Verification to Group Key Establishment. Computer Science Annual Workshop, Malta - November 2018. [paper],[presentation]
  2. BOHLI, J.-M., GONZÁLEZ VASCO, M. I. and STEINWANDT, R.: Password-authenticated Group Key Establishment from Smooth Projective Hash Functions. Int. J. Appl. Math. Comput. Sci., vol. 29, no. 4, 2019.
  3. BAI, S., MILLER, S. and WEN, W.: A Refined Analysis of the Cost for Solving LWE via uSVP. AFRICACRYPT 2019: Progress in Cryptology – AFRICACRYPT 2019, pp 181-205. [link]
  4. GROŠEK, O. - FABŠIČ, T.: Computing multiplicative inverses in finite fields by long division. In Journal of Electrical Engineering. Vol. 69, No. 5 (2018), s. 400-402. ISSN 1335-3632 (2017: 0.508 - IF, 4 - JCR Best Q, 0.205 - SJR, Q3 - SJR Best Q). [paper]
  5. ZAJAC, P.: Code-based signature scheme derived from a MRHS representation of an AES encryption. In Central European Conference on Cryptology 2019 : Telč, Czech Republic. June 12-14, 2019. Brno : Masaryk University, 2019, S. 39-42. [abstract]
  6. ZAJAC, P.ŠPAČEK, P.: Preventing potential backdoors in BIKE algorithm, Tatra Mt. Math. Publ. 73 (2019), 193–207. [paper]
  7. José Ignacio Escribano PablosMaría Isabel González VascoMisael Enrique Marriaga and Ángel Luis Pérez del Pozo: The Cracking of WalnutDSA: A Survey. Symmetry 2019, 11(9), 1072.
  8. Hai Pham, Rainer Steinwandt and Adriana Suárez CoronaIntegrating Classical Preprocessing into an Optical Encryption Scheme. Entropy 2019, 21(9), 872.
  9. HROMADA, V.: Acoustic Side-Channels in Cryptography. CYBERSEC CEE 2019 – 5th European Cybersecurity Forum. Katowice, Poland. 29. - 30. 10. 2019 [presentation]
  10. MATHEIS, K., STEINWANDT, R. and SUÁREZ CORONA, A.: Algebraic Properties of the Block Cipher DESL, Symmetry, vol. 11, no. 11, 1411, 2019 [paper]
  11. SPACEK, P. - COLOMBO, C. - VELLA, M.: Using TEE and RV in PQ-TLS Communication. CSAW'19. Department of Computer Science. University of Malta. 29. 11. 2019 [presentation][extended abstract][worskhop programme]
  12. PERSICHETTI, E., STEINWANDT, R. and SUÁREZ CORONA, A.: From Key Encapsulation to Authenticated Group Key Establishment – a Compiler for Post-Quantum Primitives, Entropy – Special Issue Blockchain: Security, Challenges, and Opportunities, vol. 21, no. 12, 1183, 2019 [paper]
  13. BAI, S. - BOUDGOUST, K. - DAS, D. - ROUX-LANGLOIS, A. - WEN, W. - ZHANG, Z.: Middle-Product Learning with Rounding Problem and Its Applications. In: Galbraith S., Moriai S. (eds) Advances in Cryptology -- ASIACRYPT 2019, Lecture Notes in Computer Science, vol. 11921, pp. 55-81, Springer, 2019.

Dissemination