Secure Implementation of a Quantum-Future GAKE Protocol

[1]  Boaz Barak,et al.  The Complexity of Public-Key Cryptography , 2017, Tutorials on the Foundations of Cryptography.

[2]  Christian Colombo,et al.  RV-TEE: secure cryptographic protocol execution based on runtime verification , 2021, Journal of Computer Virology and Hacking Techniques.

[3]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[4]  Carlos V. Rozas,et al.  Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave , 2016, HASP 2016.

[5]  David A. Basin,et al.  The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.

[6]  Russ Housley,et al.  Counter with CBC-MAC (CCM) , 2003, RFC.

[7]  Christian Colombo,et al.  Runtime verification for trustworthy secure shell deployment , 2021, VORTEX@ISSTA.

[8]  L. Jean Camp,et al.  A qualitative study on usability and acceptability of Yubico security key , 2018, STAST '17.

[9]  Eike Kiltz,et al.  Message Authentication, Revisited , 2012, EUROCRYPT.

[10]  Hui Yu,et al.  ECDSA weak randomness in Bitcoin , 2020, Future Gener. Comput. Syst..

[11]  Jonathan Katz,et al.  Scalable Protocols for Authenticated Group Key Exchange , 2003, CRYPTO.

[12]  Christian Colombo,et al.  Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification , 2020, ICISSP.

[13]  Daniel J. Bernstein,et al.  Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.

[14]  Robert Künnemann,et al.  Short Paper: Modular Black-box Runtime Verification of Security Protocols , 2020, PLAS@CCS.

[15]  Martin Leucker,et al.  A brief account of runtime verification , 2009, J. Log. Algebraic Methods Program..

[16]  Tibor Jager,et al.  Practical Invalid Curve Attacks on TLS-ECDH , 2015, ESORICS.

[17]  Leonardo Mariani,et al.  Run-Time Verification , 2004, Model-Based Testing of Reactive Systems.

[18]  Erdem Alkim,et al.  Cortex-M4 optimizations for {R,M} LWE schemes , 2020 .

[19]  Peter Schwabe,et al.  All the AES You Need on Cortex-M3 and M4 , 2016, SAC.

[20]  Douglas Stebila,et al.  Transitioning to a Quantum-Resistant Public Key Infrastructure , 2017, IACR Cryptol. ePrint Arch..

[21]  Peter Schwabe,et al.  Faster Multiplication in \mathbb Z_2^m[x] on Cortex-M4 to Speed up NIST PQC Candidates , 2019, ACNS.

[22]  Jan Jürjens,et al.  Runtime verification of cryptographic protocols , 2010, Comput. Secur..

[23]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[24]  Gordon J. Pace,et al.  Industrial Experiences with Runtime Verification of Financial Transaction Systems: Lessons Learnt and Standing Challenges , 2018, Lectures on Runtime Verification.