Publications and project dissemination

All publications, presentations, and other externally distributed materials stemming from the MYP grant shall comply with SPS Visual Identity Guidelines (provided to project co-directors) and shall credit NATO support with the following or a substantially similar sentence:

This research was sponsored [in part] by the NATO Science for Peace and Security Programme under grant G5448.


  1. COLOMBO, C. et al.: Applying Runtime Verification to Group Key Establishment. Computer Science Annual Workshop, Malta - November 2018. [paper],[presentation]
  2. BOHLI, J.-M., GONZÁLEZ VASCO, M. I. and STEINWANDT, R.: Password-authenticated Group Key Establishment from Smooth Projective Hash Functions. Int. J. Appl. Math. Comput. Sci., vol. 29, no. 4, 2019.
  3. BAI, S., MILLER, S. and WEN, W.: A Refined Analysis of the Cost for Solving LWE via uSVP. AFRICACRYPT 2019: Progress in Cryptology – AFRICACRYPT 2019, pp 181-205. [link]
  4. GROŠEK, O. - FABŠIČ, T.: Computing multiplicative inverses in finite fields by long division. In Journal of Electrical Engineering. Vol. 69, No. 5 (2018), s. 400-402. ISSN 1335-3632 (2017: 0.508 - IF, 4 - JCR Best Q, 0.205 - SJR, Q3 - SJR Best Q). [paper]
  5. ZAJAC, P.: Code-based signature scheme derived from a MRHS representation of an AES encryption. In Central European Conference on Cryptology 2019 : Telč, Czech Republic. June 12-14, 2019. Brno : Masaryk University, 2019, S. 39-42. [abstract]
  6. ZAJAC, P.ŠPAČEK, P.: Preventing potential backdoors in BIKE algorithm, Tatra Mt. Math. Publ. 73 (2019), 193–207. [paper]
  7. José Ignacio Escribano PablosMaría Isabel González VascoMisael Enrique Marriaga and Ángel Luis Pérez del Pozo: The Cracking of WalnutDSA: A Survey. Symmetry 2019, 11(9), 1072.
  8. Hai Pham, Rainer Steinwandt and Adriana Suárez CoronaIntegrating Classical Preprocessing into an Optical Encryption Scheme. Entropy 2019, 21(9), 872.