DiplomaWork/templates/chapters/bibliography.bib

292 lines
10 KiB
BibTeX
Raw Normal View History

2022-05-13 18:52:39 +00:00
@article{divvpn,
author = {Sridevi, Sridevi and D H, Manjaiah},
year = {2012},
month = {06},
pages = {93-96},
title = {Technical Overview of Virtual Private Networks(VPNs)},
volume = {2},
journal = {International Journal of Scientific Research},
doi = {10.15373/22778179/JULY2013/32},
url={https://www.researchgate.net/publication/274929918_Technical_Overview_of_Virtual_Private_NetworksVPNs},
note="[Online; Citované: 22.1.2022]"
}
@ARTICLE{vbox,
title={Oracle VM Virtual Box},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/VirtualBox},
note="[Online; Citované: 20.1.2022]"
}
@ARTICLE{sha2,
title={Secure Hash Algorithm 2 (SHA-2)},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/SHA-2},
note="[Online; Citované: 21.5.2021]"
}
@ARTICLE{base,
title={Base64},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Base64},
note="[Online; Citované: 21.5.2021]"
}
@article{ciscovpn,
title={Virtual Private Networks Simplified},
publisher={Cisco},
url={https://www.cisco.com/c/dam/en_us/training-events/le21/le34/downloads/689/academy/2008/sessions/BRK-134T_VPNs_Simplified.pdf},
note="[Online; Citované:26.1.2022]"
}
@article{vmkonfig,
title={Installing Windows 10 on Virtualbox 6.1.12 -- FULL PROCESS, 2020 -- video tutorial},
author={MikeTheTech},
year={2020},
url={https://www.youtube.com/watch?v=gKQvaPejxpc&ab_channel=MikeTheTech},
note="[Online; Citované: 17.5.2021]"
}
@article{vbguide,
title={VirtualBox Network Settings: Complete Guide},
author={Michael Bose},
publisher={Nakivo},
year={2019},
url={https://www.nakivo.com/blog/virtualbox-network-setting-guide/},
note="[Online; Citované:26.1.2022]"
}
@article{vboracle,
title={6.2. Introduction to Networking Modes},
author={Oracle},
url={https://www.virtualbox.org/manual/ch06.html},
note="[Online; Citované:26.1.2022]"
}
@article{tcp,
title={Transmission Control Protocol},
author={Wikipedia},
url={https://en.wikipedia.org/wiki/Transmission_Control_Protocol},
note="[Online; Citované:26.1.2022]"
}
@article{cryptol,
title={Cryptol -- The Language of Cryptography},
author={Cryptol},
url={https://cryptol.net/index.html},
note="[Online; Citované:6.2.2022]"
}
@misc{xoodoocb,
author = {Joan Daemen and
Seth Hoffert and
Michaël Peeters and
Gilles Van Assche and
Ronny Van Keer},
title = {Xoodoo cookbook (2.revision)},
howpublished = {Cryptology ePrint Archive, Report 2018/767},
year = {2019},
url = {https://eprint.iacr.org/2018/767.pdf},
note = "[Online; Citované:6.2.2022]"
}
@article{xd,
title={The design of Xoodoo and Xoofff},
author = {Joan Daemen, Seth Hoffert, Gilles Van Assche and Ronny Van Keer},
volume={2018},
url={https://tosc.iacr.org/index.php/ToSC/article/view/7359/6529},
DOI={10.13154/tosc.v2018.i4.1-38},
year={2018},
note="[Online; Citované:6.2.2022]"
}
@misc{xdupdate,
title={Xoodyak, an update},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Publication to NIST Lightweight Cryptography Standardization Process (round~…},
url={https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/status-update-sep2020/Xoodyak-update.pdf},
note="[Online; Citované:6.2.2022]"
}
@misc{xdr1,
title={Xoodyak},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Publication to NIST Lightweight Cryptography Standardization Process},
url={https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/Xoodyak-spec.pdf},
note="[Online; Citované:6.2.2022]"
}
@misc{tkecak,
title={Xoodyak},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/xoodyak.html},
note="[Online; Citované:6.2.2022]"
}
@ARTICLE{tls,
title={Transport Layer Security},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3},
note="[Online; Citované: 21.5.2021]"
}
@article{biks,
title={Bezpečnosť v architektúre TCP/IP II (BIKS pr7)},
author={Miloš Drutarovský},
note="[Online; Citované:6.2.2022]"
}
@article{tcp2,
title={5. Prednáška - Transportná vrstva: Protokol TCP},
author={Institute of Computer Science UPJS},
url={https://siete.ics.upjs.sk/prednaska-5/},
note="[Online; Citované:6.2.2022]"
}
@article{gimli,
title={Gimli 2019-03-29},
author={Publication to NIST Lightweight Cryptography Standardization Process},
url={https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/gimli-spec.pdf},
note="[Online; Citované:6.2.2022]"
}
@article{simpira,
title={Simpira v2: A Family of Efficient Permutations Using the AES Round Function},
author={Shay Gueron, Nicky Mouha},
url={https://hal.inria.fr/hal-01403414/document},
note="[Online; Citované:6.2.2022]"
}
@article{make,
title={GNU Make Manual},
author={GNU org.},
url={https://www.gnu.org/software/make/manual/html_node/index.html},
note="[Online; Citované:20.2.2022]"
}
@article{endianita,
title={Endianita},
author={Wikipedia},
url={https://sk.wikipedia.org/wiki/Endianita},
note="[Online; Citované:20.2.2022]"
}
@article{poll,
title={Poll},
author={man7org},
url={https://man7.org/linux/man-pages/man2/poll.2.html},
note="[Online; Citované:20.2.2022]"
}
@article{ternary,
title={Ternary Operator in C Explained},
author={freeCodeCamp.org},
url={https://www.freecodecamp.org/news/c-ternary-operator/},
note="[Online; Citované:20.2.2022]"
}
@ARTICLE{bufferbloat,
title={Bufferbloat},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Bufferbloat},
note="[Online; Citované: 1.3.2021]"
}
@ARTICLE{aes,
title={Advanced Encryption Standard},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Advanced_Encryption_Standard},
note="[Online; Citované: 8.5.2021]"
}
@book{levicky,
title={Kryptografia v informačnej bezpečnosti},
author={Levický, Dušan},
year={2005},
publisher={Elfa}
}
@misc{kravatte,
title={Kravatte},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/kravatte.html},
note="[Online; Citované:6.2.2022]"
}
@misc{keccakp,
title={The Keccak-p Permutations},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/keccakp.html},
note="[Online; Citované:6.2.2022]"
}
@misc{kecsup,
title={The Keccak-p Permutations},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/specifications.html},
note="[Online; Citované:6.2.2022]"
}
@inproceedings{bernstein2017gimli,
title={Gimli: a cross-platform permutation},
author={Bernstein, Daniel J and K{\"o}lbl, Stefan and Lucks, Stefan and Massolino, Pedro Maat Costa and Mendel, Florian and Nawaz, Kashif and Schneider, Tobias and Schwabe, Peter and Standaert, Fran{\c{c}}ois-Xavier and Todo, Yosuke and others},
booktitle={International Conference on Cryptographic Hardware and Embedded Systems},
pages={299--320},
year={2017},
organization={Springer}
}
@misc{farfalle,
title={Farfalle: parallel permutation-based cryptography},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/farfalle.html},
note="[Online; Citované:6.2.2022]"
}
@misc{duplex,
title={The sponge and duplex constructions},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/sponge_duplex.html},
note="[Online; Citované:6.2.2022]"
}
@misc{xcb,
title={Xoodoo cookbook},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://eprint.iacr.org/2018/767.pdf},
note="[Online; Citované:6.2.2022]"
}
@InProceedings{duplex,
author="Daemen, Joan
and Mennink, Bart
and Van Assche, Gilles",
editor="Takagi, Tsuyoshi
and Peyrin, Thomas",
title="Full-State Keyed Duplex with Built-In Multi-user Support",
booktitle="Advances in Cryptology -- ASIACRYPT 2017",
year="2017",
publisher="Springer International Publishing",
address="Cham",
pages="606--637",
abstract="The keyed duplex construction was introduced by Bertoni et al. (SAC 2011) and recently generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). We present a generalization of the full-state keyed duplex that natively supports multiple instances by design, and perform a security analysis that improves over that of Mennink et al. in terms of a more modular security analysis and a stronger and more adaptive security bound. Via the introduction of an additional parameter to the analysis, our bound demonstrates a significant security improvement in case of nonce-respecting adversaries. Furthermore, by supporting multiple instances by design, instead of adapting the security model to it, we manage to derive a security bound that is largely independent of the number of instances.",
isbn="978-3-319-70697-9",
url={https://link.springer.com/chapter/10.1007/978-3-319-70697-9_21#citeas},
note="[Online; Citované:6.2.2022]"
}
@misc{keyak,
title={The Keyak authenticated encryption scheme},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/keyak.html},
note="[Online; Citované:6.2.2022]"
}
@ARTICLE{ratchet,
title={What is a ratchet?},
publisher={Cryptography StackExcchange},
url={https://crypto.stackexchange.com/questions/39762/what-is-a-ratchet},
note="[Online; Citované: 8.5.2021]"
}
@ARTICLE{fsec,
title={Forward secrecy},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Forward_secrecy},
note="[Online; Citované: 8.5.2021]"
}
@ARTICLE{sec,
title={Security level},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Security_level},
note="[Online; Citované: 8.5.2021]"
}