Publications, presentations and project dissemination

All publications, presentations, and other externally distributed materials stemming from the MYP grant shall comply with SPS Visual Identity Guidelines (provided to project co-directors) and shall credit NATO support with the following or a substantially similar sentence:

This research was sponsored [in part] by the NATO Science for Peace and Security Programme under grant G5448.


  1. [paper] COLOMBO, C. et al.: Applying Runtime Verification to Group Key Establishment. Computer Science Annual Workshop, Malta - November 2018.
  2. [paper] BOHLI, J. M. - GONZÁLEZ VASCO, M. I. - STEINWANDT, R.: Password-authenticated Group Key Establishment from Smooth Projective Hash Functions. Int. J. Appl. Math. Comput. Sci., vol. 29, no. 4, 2019.
  3. [paper] BAI, S. - MILLER, S. - WEN, W.: A Refined Analysis of the Cost for Solving LWE via uSVP. AFRICACRYPT 2019: Progress in Cryptology – AFRICACRYPT 2019, pp 181-205.
  4. [paper] GROŠEK, O. - FABŠIČ, T.: Computing multiplicative inverses in finite fields by long division. In Journal of Electrical Engineering. Vol. 69, No. 5 (2018), s. 400-402. ISSN 1335-3632 (2017: 0.508 - IF, 4 - JCR Best Q, 0.205 - SJR, Q3 - SJR Best Q).
  5. [paper] ZAJAC, P. - ŠPAČEK, P.: Preventing potential backdoors in BIKE algorithm, Tatra Mt. Math. Publ. 73 (2019), 193–207.
  6. [paper] ESCRIBANO PABLOS, J. I. - GONZÁLEZ VASCO, M. I. - MARRIAGA, M. E. - PÉREZ DEL POZO, Á. L.: The Cracking of WalnutDSA: A Survey. Symmetry 2019, 11(9), 1072.
  7. [paper] PHAM, H. - STEINWANDT, R. - CORONA, A. S.Integrating Classical Preprocessing into an Optical Encryption Scheme. Entropy 2019, 21(9), 872.
  8. [paper] MATHEIS, K. - STEINWANDT, R. - SUÁREZ CORONA, A.: Algebraic Properties of the Block Cipher DESL, Symmetry, vol. 11, no. 11, 1411, 2019.
  9. [paper] PERSICHETTI, E. - STEINWANDT, R. - SUÁREZ CORONA, A.: From Key Encapsulation to Authenticated Group Key Establishment – a Compiler for Post-Quantum Primitives, Entropy – Special Issue Blockchain: Security, Challenges, and Opportunities, vol. 21, no. 12, 1183, 2019.
  10. [paper] BAI, S. - BOUDGOUST, K. - DAS, D. - ROUX-LANGLOIS, A. - WEN, W. - ZHANG, Z.: Middle-Product Learning with Rounding Problem and Its Applications. In: Galbraith S., Moriai S. (eds) Advances in Cryptology -- ASIACRYPT 2019, Lecture Notes in Computer Science, vol. 11921, pp. 55-81, Springer, 2019.
  11. [paper] COLOMBO, C. - VELLA, M.: Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. In: ForSE, Valletta, Malta, 2020.
  12. [paper] BOHLI, J.-M. - GONZÁLEZ VASCO, M.I. - STEINWANDT, R.: Building Group Key Establishment on Group Theory: A Modular Approach, Symmetry – Special Issue on Interactions between Group Theory, Symmetry and Cryptology) 2020, 12(2), 197.
  13. [paper] LANGENBERG, B. - PHAM, H. - STEINWANDT, R.: Reducing the Cost of Implementing AES as a Quantum Circuit, IEEE Transactions on Quantum Engineering, 2020.
  14. [to appear] GONZÁLEZ VASCO, M. I. - PÉREZ DEL POZO, A. L. - SORIENTE, C.: A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols. IEEE Transactions on Dependable and Secure Computing.
  15. [to appear] GONZÁLEZ VASCO, M. I.: El Enemigo a las Puertas: avances en criptografía clásica para un mundo cuántico. Gazette of the Royal Spanish Mathematical Society.
  16. [paper] ZAJAC,P. - ŠPAČEK, P.: A New Type of Signature Scheme Derived from a MRHS Representation of a Symmetric Cipher. Infocommunications Journal, Vol. XI, No. 4, December 2019, pp. 23-30. DOI: 10.36244/ICJ.2019.4.4
  17. [paper] ALBRECHT, M. R. et al.: Faster Enumeration-based Lattice Reduction: Root Hermite Factor $k^{1/(2k)}$ in Time $k^{k/8+o(k)}$. Cryptology ePrint Archive, Report 2020/707, IACR-CRYPTO-2020, 12 Jun 2020. 
  18. [paper] GONZÁLEZ VASCO, M. I. et al.: Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber. Mathematics 2020, 8(10), 1853.
  19. [paper] GONZÁLEZ VASCO, M. I. et al.: Shuffle, Cut, and Learn: Crypto Go, a Card Game for Teaching Cryptography. Mathematics 2020, 8(11), 1993.
  20. [paper] ZAJAC, P.: Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications. Sensors, 2021, 21(6), 2036.

Presentations and abstracts

  1. COLOMBO, C. et al.: Applying Runtime Verification to Group Key Establishment. Computer Science Annual Workshop, Malta - November 2018. [presentation]
  2. ZAJAC, P.: Code-based signature scheme derived from a MRHS representation of an AES encryption. In Central European Conference on Cryptology 2019 : Telč, Czech Republic. June 12-14, 2019. Brno : Masaryk University, 2019, S. 39-42. [abstract]
  3. HROMADA, V.: Acoustic Side-Channels in Cryptography. CYBERSEC CEE 2019 – 5th European Cybersecurity Forum. Katowice, Poland. 29. - 30. 10. 2019 [presentation]
  4. ŠPAČEK, P. - COLOMBO, C. - VELLA, M.: Using TEE and RV in PQ-TLS Communication. CSAW'19. Department of Computer Science. University of Malta. 29. 11. 2019 [presentation][extended abstract][worskhop programme]
  5. ŠPAČEK, P. - COLOMBO, C. - VELLA, M.: Combining HSM and RV to secure communication. Department of Computer Science. University of Malta. [presentation], [photo]
  6. PHAM, H. - STEINWANDT, R.: On implementing the AES S-box as a quantum circuit. Talk at AMS Sectional Meeting in a special session on Mathematical Cryptology. [abstract]
  7. PQC WIKI. A platform for NIST post-quantum cryptography standardization.  This work has in part been supported through NIST award 60NANB18D217 and the NATO SPS Programme under grant G5448. [link]
  8. PERNICKÝ, Ľ. - ZAJAC, P. Integration of post-quantum cryptography to Android application (in Slovak). In Santa's Crypto 2019 : proceedings. Praha, Czech Republic. 5.-6.12.2019. 1. ed. Bílovice nad Svitavou : Trusted Network Solutions, 2019, pp. 37-38.
  9. FABŠIČ, T. Šifrovanie a hrozba kvantových počítačov. Prednáška o postkvantovej kryptografii v bratislavskom podniku Satori Stage v rámci série popularizačných prednášok o vede s názvom Vedatour. 30.9.2019 [link][video][presentation]
  10. COLOMBO, C. - VELLA, M.: Secure Cryptographic Protocol Execution based on Runtime Verification. Talk at Cybersecurity Conference, ESkills Foundation, Malta, February 2020. [presentation][photo]
  11. MARRIAGA, M.: Post-quantum Vs Quantum Future: The case of  Group Key Exchange. Talk at the V Congreso de Jóvenes Investigadores de la RSME, January 2020. [link][photo]
  12. VELLA, M. The need for quantum-safe cryptographic protocols. Presented during a webinar entitled Cybsersecurity in Supervision organized by the Malta Financial Services Authority (MFSA), 11 May 2021. [link]