Publications, presentations and project dissemination

All publications, presentations, and other externally distributed materials stemming from the MYP grant shall comply with SPS Visual Identity Guidelines (provided to project co-directors) and shall credit NATO support with the following or a substantially similar sentence:

This research was sponsored [in part] by the NATO Science for Peace and Security Programme under grant G5448.


Publications

  1. COLOMBO, C. et al.: Applying Runtime Verification to Group Key Establishment. Computer Science Annual Workshop, Malta - November 2018. [paper]
  2. BOHLI, J. M. - GONZÁLEZ VASCO, M. I. - STEINWANDT, R.: Password-authenticated Group Key Establishment from Smooth Projective Hash Functions. Int. J. Appl. Math. Comput. Sci., vol. 29, no. 4, 2019. [paper]
  3. BAI, S. - MILLER, S. - WEN, W.: A Refined Analysis of the Cost for Solving LWE via uSVP. AFRICACRYPT 2019: Progress in Cryptology – AFRICACRYPT 2019, pp 181-205. [paper]
  4. GROŠEK, O. - FABŠIČ, T.: Computing multiplicative inverses in finite fields by long division. In Journal of Electrical Engineering. Vol. 69, No. 5 (2018), s. 400-402. ISSN 1335-3632 (2018: 0.636 - IF, Q4 - JCR Best Q, 0.200 - SJR, Q3 - SJR Best Q). V databáze: WOS: 000453413200012 ; SCOPUS: 2-s2.0-85059569379
  5. ZAJAC, P. - ŠPAČEK, P.: Preventing potential backdoors in bike algorithm. In Tatra Mountains Mathematical Publications : Number theory, algebra and cryptology '18. Vol. 73, (2019), s. 179-193. ISSN 1210-3195 (2019: 0.214 - SJR, Q4 - SJR Best Q). V databáze: SCOPUS: 2-s2.0-85072285502 ; DOI: 10.2478/tmmp-2019-0013.
  6. ESCRIBANO PABLOS, J. I. - GONZÁLEZ VASCO, M. I. - MARRIAGA, M. E. - PÉREZ DEL POZO, Á. L.: The Cracking of WalnutDSA: A Survey. Symmetry 2019, 11(9), 1072. [paper]
  7. PHAM, H. - STEINWANDT, R. - CORONA, A. S.Integrating Classical Preprocessing into an Optical Encryption Scheme. Entropy 2019, 21(9), 872. [paper]
  8. MATHEIS, K. - STEINWANDT, R. - SUÁREZ CORONA, A.: Algebraic Properties of the Block Cipher DESL, Symmetry, vol. 11, no. 11, 1411, 2019. [paper]
  9. PERSICHETTI, E. - STEINWANDT, R. - SUÁREZ CORONA, A.: From Key Encapsulation to Authenticated Group Key Establishment – a Compiler for Post-Quantum Primitives, Entropy – Special Issue Blockchain: Security, Challenges, and Opportunities, vol. 21, no. 12, 1183, 2019. [paper]
  10. BAI, S. - BOUDGOUST, K. - DAS, D. - ROUX-LANGLOIS, A. - WEN, W. - ZHANG, Z.: Middle-Product Learning with Rounding Problem and Its Applications. In: Galbraith S., Moriai S. (eds) Advances in Cryptology -- ASIACRYPT 2019, Lecture Notes in Computer Science, vol. 11921, pp. 55-81, Springer, 2019. [paper]
  11. COLOMBO, C. - VELLA, M.: Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. In: ForSE, Valletta, Malta, 2020. [paper]
  12. BOHLI, J.-M. - GONZÁLEZ VASCO, M.I. - STEINWANDT, R.: Building Group Key Establishment on Group Theory: A Modular Approach, Symmetry – Special Issue on Interactions between Group Theory, Symmetry and Cryptology) 2020, 12(2), 197. [paper]
  13. LANGENBERG, B. - PHAM, H. - STEINWANDT, R.: Reducing the Cost of Implementing AES as a Quantum Circuit, IEEE Transactions on Quantum Engineering, 2020. [paper]
  14. [to appear] GONZÁLEZ VASCO, M. I. - PÉREZ DEL POZO, A. L. - SORIENTE, C.: A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols. IEEE Transactions on Dependable and Secure Computing.
  15. [to appear] GONZÁLEZ VASCO, M. I.: El Enemigo a las Puertas: avances en criptografía clásica para un mundo cuántico. Gazette of the Royal Spanish Mathematical Society.
  16. ZAJAC, P. - ŠPAČEK, P.: A new type of signature scheme derived from a MRHS representation of a symmetric cipher. In Infocommunications journal. Vol. 11, No. 4 (2019), s. 23-30. ISSN 2061-2079 (2019: 0.141 - SJR, Q4 - SJR Best Q). V databáze: SCOPUS: 2-s2.0-85090875721.
  17. ALBRECHT, M. R. et al.: Faster Enumeration-based Lattice Reduction: Root Hermite Factor $k^{1/(2k)}$ in Time $k^{k/8+o(k)}$. Cryptology ePrint Archive, Report 2020/707, IACR-CRYPTO-2020, 12 Jun 2020. [paper]
  18. GONZÁLEZ VASCO, M. I. et al.: Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber. Mathematics 2020, 8(10), 1853. https://doi.org/10.3390/math8101853. [paper]
  19. GONZÁLEZ VASCO, M. I. et al.: Shuffle, Cut, and Learn: Crypto Go, a Card Game for Teaching Cryptography. Mathematics 2020, 8(11), 1993. https://doi.org/10.3390/math8111993. [paper]
  20. CURMI, A. - COLOMBO, C: - VELLA, M.: Runtime Verification for Trustworthy Secure Shell Deployment. International Workshop on Verification and mOnitoring at Runtime EXecution (VORTEX), Virtual Aarhus, Denmark, 2021.
  21. VELLA, M. - COLOMBO, C. - ABELA, R. - ŠPAČEK, P.: RV-TEE: secure cryptographic protocol execution based on runtime verification. In Journal of Computer Virology and Hacking Techniques. Vol. 17, No. 3 (2021), s. 229-248. ISSN 2263-8733. V databáze: SCOPUS: 2-s2.0-85109348525 ; WOS: 000669772300001 ; DOI: 10.1007/s11416-021-00391-1.
  22. ABELA, R. - COLOMBO, C. - MALO, P. - SÝS, P. - FABŠIČ, T. - GALLO, O. - HROMADA, V. - VELLA, M.: Secure implementation of a quantum-future GAKE protocol. In ZHOU, Jianying.Security and Trust Management : 17th International Workshop, STM 2021. Darmstadt, Germany. October 8, 2021. Cham : Springer, 2021, S. 103-121. ISBN 978-3-030-91858-3. V databáze: DOI: 10.1007/978-3-030-91859-0_6 ; SCOPUS: 2-s2.0-85121907279.
  23. COLOMBO, C. - VASCO, M. I. - STEINWANDT, R. - ZAJAC, P.: Secure Communication in the Quantum Era: (Group) Key Establishment. In Advanced Technologies for Security Applications : Proceedings of the NATO Science for Peace and Security 'Cluster Workshop on Advenced Technologies'. Leuven, Belgium. September 17-18, 2019. 1. ed. Dordrecht : Springer, 2020, S. 65-74. ISBN 978-94-024-2023-4. V databáze: SCOPUS: 2-s2.0-85087560245 ; DOI: 10.1007/978-94-024-2021-0_7.
  24. GONZÁLEZ VASCO, M.I. et al.: An Attack on Zawadzki's Quantum Authentication Scheme. Entropy, 23(4), 38, 2021. https://doi.org/10.3390/e23040389. [paper]
  25. GONZÁLEZ VASCO, M.I. et al.: Group Key Establishment in a Quantum-Future Scenario. Informatica, Vol 31, 4,  pp. 751-768, 2020. https://doi.org/10.15388/20-INFOR427. [paper]
  26.  ARRAYÁS, M. - TRUEBA, J. L. - URIARTE, C. - ZMEEV, D. E. Design of a system for controlling a levitating sphere in superfluid 3He at extremely low temperatures.
  27. BALOGH, Š. - GALLO, O. - PLOSZEK, R. - ŠPAČEK, P. - ZAJAC, P.: IoT security challenges: Cloud and blockchain, postquantum cryptography, and evolutionary techniques. In Electronics. Vol. 10, iss. 21 (2021), Art. no. 2647 [22] s. ISSN 2079-9292 (2020: 2.397 - IF, Q3 - JCR Best Q, 0.360 - SJR, Q2 - SJR Best Q). V databáze: DOI: 10.3390/electronics10212647 ; WOS: 000718523800001 ; CC: 000718523800001 ; SCOPUS: 2-s2.0-85118176860.
  28. GROŠEK, O. - ANTAL, E. - FABŠIČ, T.: Remarks on breaking the Vigenere autokey cipher. In Cryptologia. Vol. 43, Iss. 6 (2019), s. 486-496. ISSN 0161-1194 (2019: 0.432 - IF, Q3 - JCR Best Q, 0.106 - SJR, Q4 - SJR Best Q). V databáze: CC: 000469567400001 ; DOI: 10.1080/01611194.2019.1596997.
  29. GROŠEK, O. - HROMADA, V. - HORÁK, P.: A cipher based on prefix codes. In Sensors. Vol. 21, Iss. 18 (2021), Art. no. 6236 [14] s. ISSN 1424-8220 (2020: 3.576 - IF, Q1 - JCR Best Q, 0.636 - SJR, Q2 - SJR Best Q). V databáze: DOI: 10.3390/s21186236 ; SCOPUS: 2-s2.0-85115108208 ; WOS: 000701118600001 ; CC: 000701118600001.
  30. ZAJAC, P.: Ephemeral keys authenticated with merkle trees and their use in IoT applications. In Sensors. Vol. 21, iss. 6 (2021), Art. no. 2036 [17] s. ISSN 1424-8220 (2020: 3.576 - IF, Q1 - JCR Best Q, 0.636 - SJR, Q2 - SJR Best Q). V databáze: DOI: 10.3390/s21062036 ; CC: 000652714500001 ; WOS: 000652714500001 ; SCOPUS: 2-s2.0-85102358756.
  31. CURMI, A. - COLOMBO, C. - VELLA, M.: RV-TEE-Based Trustworthy Secure Shell Deployment: An Empirical Evaluation. Journal of Object Technology, 21(2), 1-15, 2022.

Submitted papers

  1. COLOMBO, C. - VELLA, M.: Runtime Verification for Security: Monitoring the Boundaries of Trust, under review.
  2. HORAK, P. - HROMADA, V. - GROSEK, O.: On the Maximum Size of a Prefix Code,  Paper no. IT-22-0254 IEEE Transactions on Information Theory.
  3. GROŠEK, O. - HROMADA, V.: A Note on the Maximum Size of a Prefix Code,  Mathematics (Manuscript ID: mathematics-1776145), Received: 1 June 2022.

Presentations and abstracts

  1. COLOMBO, C. et al.: Applying Runtime Verification to Group Key Establishment. Computer Science Annual Workshop, Malta - November 2018. [presentation]
  2. HROMADA, V.: Acoustic Side-Channels in Cryptography. CYBERSEC CEE 2019 – 5th European Cybersecurity Forum. Katowice, Poland. 29. - 30. 10. 2019 [presentation]
  3. ŠPAČEK, P. - COLOMBO, C. - VELLA, M. Using TEE and RV in PQ-TLS communication. In CSAW ’19 : Computer science annual workshop. Msida, Malta. November 6-8, 2019. Msida : University of Malta, 2019, S. 14. [presentation][extended abstract][worskhop programme]
  4. ŠPAČEK, P. - COLOMBO, C. - VELLA, M.: Combining HSM and RV to secure communication. Department of Computer Science. University of Malta. [presentation], [photo]
  5. PHAM, H. - STEINWANDT, R.: On implementing the AES S-box as a quantum circuit. Talk at AMS Sectional Meeting in a special session on Mathematical Cryptology. [abstract]
  6. PQC WIKI. A platform for NIST post-quantum cryptography standardization.  This work has in part been supported through NIST award 60NANB18D217 and the NATO SPS Programme under grant G5448. [link]
  7. FABŠIČ, T. Šifrovanie a hrozba kvantových počítačov (Cryptography and the threat of quantum computers). A talk presented as a part of the Vedatour series of popularization talks. Bratislava. 30.9.2019 [link][video][presentation]
  8. COLOMBO, C. - VELLA, M.: Secure Cryptographic Protocol Execution based on Runtime Verification. Talk at Cybersecurity Conference, ESkills Foundation, Malta, February 2020. [presentation][photo]
  9. MARRIAGA, M. Post-quantum Vs Quantum Future: The case of  Group Key Exchange. Talk at the V Congreso de Jóvenes Investigadores de la RSME, January 2020. [link][photo]
  10. VELLA, M. The need for quantum-safe cryptographic protocols. Presented during a webinar entitled Cybsersecurity in Supervision organized by the Malta Financial Services Authority (MFSA), 11 May 2021. [link]
  11. HROMADA, V. Using GeMSS in multivariate Rng signature scheme. In CECC 2021 : Book of abstracts : 21th Central European conference on cryptology. Debrecen, Hungary. June 23-25, 2021. Debrecen : University of Debrecen, 2021, S. 59-60.
  12. JANČI, D. - HROMADA, V. - VOJVODA, M. Searching for row complete latin squares (a new benchmark for SAT solvers). In CECC 2021 : Book of abstracts : 21th Central European conference on cryptology. Debrecen, Hungary. June 23-25, 2021. Debrecen : University of Debrecen, 2021, S. 20-21.
  13. ŠPAČEK, P. Benchmarking post-quantum KEMs for group key establishment in TEE. In CECC 2021 : Book of abstracts : 21th Central European conference on cryptology. Debrecen, Hungary. June 23-25, 2021. Debrecen : University of Debrecen, 2021, S. 65-66.
  14. GONZÁLEZ VASCO, M.I. - PÉREZ DEL POZO, A. - STEINWANDT, R. - SUÁREZ CORONA, A: Password-Authenticated Key Establishment in the Advent of Scalable Quantum Computing, Talk at AMS Special Session of Mathematics in Security & Defense. Joint Mathematics Meeting. January 7, 2021. link
  15. GROŠEK, O. Existuje dokonalá náhodnosť? (Does perfect randomness exist?) In SantaCrypt 2020/21. Prague, Czech Republic. September 2-3 2021. (invited talk)
  16. COLOMBO, C. - VELLA, M. Cybersecurity Challenges - What are researchers doing to help? Science in the City 2021. Video. PDF.
  17. ABELA, R. - COLOMBO, C. - MALO, P. - SÝS, P. - FABŠIČ, T. - GALLO, O. - HROMADA, V. and VELLA, M.: Secure Implementation of a Quantum-Future GAKE Protocol. 17th International Workshop On Security And Trust Management. Short introductory video, [PDF]
  18. COLOMBO, C. - ABELA, R. The Cyber Research Domain: From Threat, to Tool, to Training. Presentation given at Cyber ROOT 21 - online webinar. [PDF
  19. FABŠIČ, T. The threat of quantum computers for cryptography. A talk at the University of Malta. 6.7.2022. [PDF]
  20. PERNICKÝ, Ľ. - ZAJAC, P.: Integrácia postkvantovej kryptografie do Android aplikácie. In Mikulášská kryptobesídka 2019 : sborník příspěvků. Praha, Česká republika. 5.-6.12.2019. 1. vyd. Bílovice nad Svitavou : Trusted Network Solutions, 2019, S. 37-38.
  21. ZAJAC, P.: Code-based signature scheme derived from a MRHS representation of an AES encryption. In Central European Conference on Cryptology 2019 : Telč, Czech Republic. June 12-14, 2019. Brno : Masaryk University, 2019, S. 39-42.

Dissemination