Secure Implementation of a Quantum-Future GAKE Protocol
暂无分享,去创建一个
Christian Colombo | Tomáš Fabšič | Viliam Hromada | Mark Vella | Robert Abela | Peter Malo | Peter Sýs | Ondrej Gallo
[1] Boaz Barak,et al. The Complexity of Public-Key Cryptography , 2017, Tutorials on the Foundations of Cryptography.
[2] Christian Colombo,et al. RV-TEE: secure cryptographic protocol execution based on runtime verification , 2021, Journal of Computer Virology and Hacking Techniques.
[3] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[4] Carlos V. Rozas,et al. Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave , 2016, HASP 2016.
[5] David A. Basin,et al. The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.
[6] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[7] Christian Colombo,et al. Runtime verification for trustworthy secure shell deployment , 2021, VORTEX@ISSTA.
[8] L. Jean Camp,et al. A qualitative study on usability and acceptability of Yubico security key , 2018, STAST '17.
[9] Eike Kiltz,et al. Message Authentication, Revisited , 2012, EUROCRYPT.
[10] Hui Yu,et al. ECDSA weak randomness in Bitcoin , 2020, Future Gener. Comput. Syst..
[11] Jonathan Katz,et al. Scalable Protocols for Authenticated Group Key Exchange , 2003, CRYPTO.
[12] Christian Colombo,et al. Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification , 2020, ICISSP.
[13] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[14] Robert Künnemann,et al. Short Paper: Modular Black-box Runtime Verification of Security Protocols , 2020, PLAS@CCS.
[15] Martin Leucker,et al. A brief account of runtime verification , 2009, J. Log. Algebraic Methods Program..
[16] Tibor Jager,et al. Practical Invalid Curve Attacks on TLS-ECDH , 2015, ESORICS.
[17] Leonardo Mariani,et al. Run-Time Verification , 2004, Model-Based Testing of Reactive Systems.
[18] Erdem Alkim,et al. Cortex-M4 optimizations for {R,M} LWE schemes , 2020 .
[19] Peter Schwabe,et al. All the AES You Need on Cortex-M3 and M4 , 2016, SAC.
[20] Douglas Stebila,et al. Transitioning to a Quantum-Resistant Public Key Infrastructure , 2017, IACR Cryptol. ePrint Arch..
[21] Peter Schwabe,et al. Faster Multiplication in \mathbb Z_2^m[x] on Cortex-M4 to Speed up NIST PQC Candidates , 2019, ACNS.
[22] Jan Jürjens,et al. Runtime verification of cryptographic protocols , 2010, Comput. Secur..
[23] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[24] Gordon J. Pace,et al. Industrial Experiences with Runtime Verification of Financial Transaction Systems: Lessons Learnt and Standing Challenges , 2018, Lectures on Runtime Verification.