Publications, presentations and project dissemination

All publications, presentations, and other externally distributed materials stemming from the MYP grant shall comply with SPS Visual Identity Guidelines (provided to project co-directors) and shall credit NATO support with the following or a substantially similar sentence:

This research was sponsored [in part] by the NATO Science for Peace and Security Programme under grant G5448.


Publications

  1. [paper] COLOMBO, C. et al.: Applying Runtime Verification to Group Key Establishment. Computer Science Annual Workshop, Malta - November 2018.
  2. [paper] BOHLI, J. M. - GONZÁLEZ VASCO, M. I. - STEINWANDT, R.: Password-authenticated Group Key Establishment from Smooth Projective Hash Functions. Int. J. Appl. Math. Comput. Sci., vol. 29, no. 4, 2019.
  3. [paper] BAI, S. - MILLER, S. - WEN, W.: A Refined Analysis of the Cost for Solving LWE via uSVP. AFRICACRYPT 2019: Progress in Cryptology – AFRICACRYPT 2019, pp 181-205.
  4. [paper] GROŠEK, O. - FABŠIČ, T.: Computing multiplicative inverses in finite fields by long division. In Journal of Electrical Engineering. Vol. 69, No. 5 (2018), s. 400-402. ISSN 1335-3632 (2017: 0.508 - IF, 4 - JCR Best Q, 0.205 - SJR, Q3 - SJR Best Q).
  5. [paper] ZAJAC, P. - ŠPAČEK, P.: Preventing potential backdoors in BIKE algorithm, Tatra Mt. Math. Publ. 73 (2019), 193–207.
  6. [paper] ESCRIBANO PABLOS, J. I. - GONZÁLEZ VASCO, M. I. - MARRIAGA, M. E. - PÉREZ DEL POZO, Á. L.: The Cracking of WalnutDSA: A Survey. Symmetry 2019, 11(9), 1072.
  7. [paper] PHAM, H. - STEINWANDT, R. - CORONA, A. S.Integrating Classical Preprocessing into an Optical Encryption Scheme. Entropy 2019, 21(9), 872.
  8. [paper] MATHEIS, K. - STEINWANDT, R. - SUÁREZ CORONA, A.: Algebraic Properties of the Block Cipher DESL, Symmetry, vol. 11, no. 11, 1411, 2019.
  9. [paper] PERSICHETTI, E. - STEINWANDT, R. - SUÁREZ CORONA, A.: From Key Encapsulation to Authenticated Group Key Establishment – a Compiler for Post-Quantum Primitives, Entropy – Special Issue Blockchain: Security, Challenges, and Opportunities, vol. 21, no. 12, 1183, 2019.
  10. [paper] BAI, S. - BOUDGOUST, K. - DAS, D. - ROUX-LANGLOIS, A. - WEN, W. - ZHANG, Z.: Middle-Product Learning with Rounding Problem and Its Applications. In: Galbraith S., Moriai S. (eds) Advances in Cryptology -- ASIACRYPT 2019, Lecture Notes in Computer Science, vol. 11921, pp. 55-81, Springer, 2019.
  11. [paper] COLOMBO, C. - VELLA, M.: Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. In: ForSE, Valletta, Malta, 2020.
  12. [paper] BOHLI, J.-M. - GONZÁLEZ VASCO, M.I. - STEINWANDT, R.: Building Group Key Establishment on Group Theory: A Modular Approach, Symmetry – Special Issue on Interactions between Group Theory, Symmetry and Cryptology) 2020, 12(2), 197.
  13. [paper] LANGENBERG, B. - PHAM, H. - STEINWANDT, R.: Reducing the Cost of Implementing AES as a Quantum Circuit, IEEE Transactions on Quantum Engineering, 2020.
  14. [to appear] GONZÁLEZ VASCO, M. I. - PÉREZ DEL POZO, A. L. - SORIENTE, C.: A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols. IEEE Transactions on Dependable and Secure Computing.
  15. [to appear] GONZÁLEZ VASCO, M. I.: El Enemigo a las Puertas: avances en criptografía clásica para un mundo cuántico. Gazette of the Royal Spanish Mathematical Society.
  16. [paper] ZAJAC,P. - ŠPAČEK, P.: A New Type of Signature Scheme Derived from a MRHS Representation of a Symmetric Cipher. Infocommunications Journal, Vol. XI, No. 4, December 2019, pp. 23-30. DOI: 10.36244/ICJ.2019.4.4
  17. [paper] ALBRECHT, M. R. et al.: Faster Enumeration-based Lattice Reduction: Root Hermite Factor $k^{1/(2k)}$ in Time $k^{k/8+o(k)}$. Cryptology ePrint Archive, Report 2020/707, IACR-CRYPTO-2020, 12 Jun 2020. 
  18. [paper] GONZÁLEZ VASCO, M. I. et al.: Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber. Mathematics 2020, 8(10), 1853. https://doi.org/10.3390/math8101853
  19. [paper] GONZÁLEZ VASCO, M. I. et al.: Shuffle, Cut, and Learn: Crypto Go, a Card Game for Teaching Cryptography. Mathematics 2020, 8(11), 1993. https://doi.org/10.3390/math8111993
  20. [paper] ZAJAC, P.: Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications. Sensors, 2021, 21(6), 2036. https://doi.org/10.3390/s21062036
  21. CURMI, A. - COLOMBO, C: - VELLA, M.: Runtime Verification for Trustworthy Secure Shell Deployment. International Workshop on Verification and mOnitoring at Runtime EXecution (VORTEX), Virtual Aarhus, Denmark, 2021.
  22. VELLA, M. - COLOMBO, C. - ABELA, R. - ŠPAČEK, P.: RV-TEE: Secure Cryptographic Protocol Execution based on Runtime Verification, J Comput Virol Hack Tech (2021). https://doi.org/10.1007/s11416-021-00391-1.
  23. ABELA, R. - COLOMBO, C. - MALO, P. - SÝS, P. - FABŠIČ, T. - GALLO, O. - HROMADA, V. VELLA, M.: Secure Implementation of a Quantum-Future GAKE Protocol, 17th International Workshop on Security and Trust Management, STM, Darmstadt, Germany, 2021.
  24. COLOMBO, C. - VASCO, M. I. - STEINWANDT, R. - ZAJAC, P.: Secure Communication in the Quantum Era: (Group) Key Establishment. In Advanced Technologies for Security Applications : Proceedings of the NATO Science for Peace and Security 'Cluster Workshop on Advanced Technologies'. Leuven, Belgium. September 17-18, 2019. 1. ed. Dordrecht : Springer, 2020, S. 65-74. ISBN 978-94-024-2023-4. DOI: 10.1007/978-94-024-2021-0_7
  25. [paper] GONZÁLEZ VASCO, M.I. et al.: An Attack on Zawadzki's Quantum Authentication Scheme. Entropy, 23(4), 38, 2021. https://doi.org/10.3390/e23040389.
  26. [paper] GONZÁLEZ VASCO, M.I. et al.: Group Key Establishment in a Quantum-Future Scenario. Informatica, Vol 31, 4,  pp. 751-768, 2020. https://doi.org/10.15388/20-INFOR427.
  27. [to appear] GROŠEK, O. - HORÁK, P. - HROMADA, V.: A Cipher Based on Prefix Codes. To appear in: Sensors, 2021.
  28.  ARRAYÁS, M. - TRUEBA, J. L. - URIARTE, C. - ZMEEV, D. E. Design of a system for controlling a levitating sphere in superfluid 3He at extremely low temperatures.

Presentations and abstracts

  1. COLOMBO, C. et al.: Applying Runtime Verification to Group Key Establishment. Computer Science Annual Workshop, Malta - November 2018. [presentation]
  2. ZAJAC, P.: Code-based signature scheme derived from a MRHS representation of an AES encryption. In Central European Conference on Cryptology 2019 : Telč, Czech Republic. June 12-14, 2019. Brno : Masaryk University, 2019, S. 39-42. [abstract]
  3. HROMADA, V.: Acoustic Side-Channels in Cryptography. CYBERSEC CEE 2019 – 5th European Cybersecurity Forum. Katowice, Poland. 29. - 30. 10. 2019 [presentation]
  4. ŠPAČEK, P. - COLOMBO, C. - VELLA, M.: Using TEE and RV in PQ-TLS Communication. CSAW'19. Department of Computer Science. University of Malta. 29. 11. 2019 [presentation][extended abstract][worskhop programme]
  5. ŠPAČEK, P. - COLOMBO, C. - VELLA, M.: Combining HSM and RV to secure communication. Department of Computer Science. University of Malta. [presentation], [photo]
  6. PHAM, H. - STEINWANDT, R.: On implementing the AES S-box as a quantum circuit. Talk at AMS Sectional Meeting in a special session on Mathematical Cryptology. [abstract]
  7. PQC WIKI. A platform for NIST post-quantum cryptography standardization.  This work has in part been supported through NIST award 60NANB18D217 and the NATO SPS Programme under grant G5448. [link]
  8. PERNICKÝ, Ľ. - ZAJAC, P. Integration of post-quantum cryptography to Android application (in Slovak). In Santa's Crypto 2019 : proceedings. Praha, Czech Republic. 5.-6.12.2019. 1. ed. Bílovice nad Svitavou : Trusted Network Solutions, 2019, pp. 37-38.
  9. FABŠIČ, T. Šifrovanie a hrozba kvantových počítačov. Prednáška o postkvantovej kryptografii v bratislavskom podniku Satori Stage v rámci série popularizačných prednášok o vede s názvom Vedatour. 30.9.2019 [link][video][presentation]
  10. COLOMBO, C. - VELLA, M.: Secure Cryptographic Protocol Execution based on Runtime Verification. Talk at Cybersecurity Conference, ESkills Foundation, Malta, February 2020. [presentation][photo]
  11. MARRIAGA, M. Post-quantum Vs Quantum Future: The case of  Group Key Exchange. Talk at the V Congreso de Jóvenes Investigadores de la RSME, January 2020. [link][photo]
  12. VELLA, M. The need for quantum-safe cryptographic protocols. Presented during a webinar entitled Cybsersecurity in Supervision organized by the Malta Financial Services Authority (MFSA), 11 May 2021. [link]
  13. HROMADA, V. Using GeMSS in multivariate Rng signature scheme. In CECC 2021 : Book of abstracts : 21th Central European conference on cryptology. Debrecen, Hungary. June 23-25, 2021. Debrecen : University of Debrecen, 2021, S. 59-60. Projekt: G5448 109.
  14. JANČI, D. - HROMADA, V. - VOJVODA, M. Searching for row complete latin squares (a new benchmark for SAT solvers). In CECC 2021 : Book of abstracts : 21th Central European conference on cryptology. Debrecen, Hungary. June 23-25, 2021. Debrecen : University of Debrecen, 2021, S. 20-21. Projekt: G5448 109.
  15. ŠPAČEK, P. Benchmarking post-quantum KEMs for group key establishment in TEE. In CECC 2021 : Book of abstracts : 21th Central European conference on cryptology. Debrecen, Hungary. June 23-25, 2021. Debrecen : University of Debrecen, 2021, S. 65-66. Projekt: G5448 109.
  16. GONZÁLEZ VASCO, M.I. - PÉREZ DEL POZO, A. - STEINWANDT, R. - SUÁREZ CORONA, A: Password-Authenticated Key Establishment in the Advent of Scalable Quantum Computing, Talk at AMS Special Session of Mathematics in Security & Defense. Joint Mathematics Meeting. January 7, 2021. link
  17. GROŠEK, O. Existuje dokonalá náhodnosť? (Does perfect randomness exist?) In SantaCrypt 2020/21. Prague, Czech Republic. September 2-3 2021. (invited talk)
  18. COLOMBO, C. - VELLA, M. Cybersecurity Challenges - What are researchers doing to help? Science in the City 2021. Video. PDF.
  19. ABELA, R. - COLOMBO, C. - MALO, P. - SÝS, P. - FABŠIČ, T. - GALLO, O. - HROMADA, V. and VELLA, M.: Secure Implementation of a Quantum-Future GAKE Protocol. 17th International Workshop On Security And Trust Management. Short introductory video, [PDF]
  20. COLOMBO, C. - ABELA, R. The Cyber Research Domain: From Threat, to Tool, to Training. Presentation given at Cyber ROOT 21 - online webinar. [PDF

Dissemination