@article{divvpn, author = {Sridevi, Sridevi and D H, Manjaiah}, year = {2012}, month = {06}, pages = {93-96}, title = {Technical Overview of Virtual Private Networks(VPNs)}, volume = {2}, journal = {International Journal of Scientific Research}, doi = {10.15373/22778179/JULY2013/32}, url={https://www.researchgate.net/publication/274929918_Technical_Overview_of_Virtual_Private_NetworksVPNs}, note="[Online; Citované: 22.1.2022]" } @ARTICLE{vbox, title={Oracle VM Virtual Box}, publisher={Wikipedia}, url={https://en.wikipedia.org/wiki/VirtualBox}, note="[Online; Citované: 20.1.2022]" } @ARTICLE{sha2, title={Secure Hash Algorithm 2 (SHA-2)}, publisher={Wikipedia}, url={https://en.wikipedia.org/wiki/SHA-2}, note="[Online; Citované: 21.5.2021]" } @ARTICLE{base, title={Base64}, publisher={Wikipedia}, url={https://en.wikipedia.org/wiki/Base64}, note="[Online; Citované: 21.5.2021]" } @article{ciscovpn, title={Virtual Private Networks Simplified}, publisher={Cisco}, url={https://www.cisco.com/c/dam/en_us/training-events/le21/le34/downloads/689/academy/2008/sessions/BRK-134T_VPNs_Simplified.pdf}, note="[Online; Citované:26.1.2022]" } @article{vmkonfig, title={Installing Windows 10 on Virtualbox 6.1.12 -- FULL PROCESS, 2020 -- video tutorial}, author={MikeTheTech}, year={2020}, url={https://www.youtube.com/watch?v=gKQvaPejxpc&ab_channel=MikeTheTech}, note="[Online; Citované: 17.5.2021]" } @article{vbguide, title={VirtualBox Network Settings: Complete Guide}, author={Michael Bose}, publisher={Nakivo}, year={2019}, url={https://www.nakivo.com/blog/virtualbox-network-setting-guide/}, note="[Online; Citované:26.1.2022]" } @article{vboracle, title={6.2. Introduction to Networking Modes}, author={Oracle}, url={https://www.virtualbox.org/manual/ch06.html}, note="[Online; Citované:26.1.2022]" } @article{tcp, title={Transmission Control Protocol}, author={Wikipedia}, url={https://en.wikipedia.org/wiki/Transmission_Control_Protocol}, note="[Online; Citované:26.1.2022]" } @article{cryptol, title={Cryptol -- The Language of Cryptography}, author={Cryptol}, url={https://cryptol.net/index.html}, note="[Online; Citované:6.2.2022]" } @misc{xoodoocb, author = {Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Xoodoo cookbook (2.revision)}, howpublished = {Cryptology ePrint Archive, Report 2018/767}, year = {2019}, url = {https://eprint.iacr.org/2018/767.pdf}, note = "[Online; Citované:6.2.2022]" } @article{xd, title={The design of Xoodoo and Xoofff}, author = {Joan Daemen, Seth Hoffert, Gilles Van Assche and Ronny Van Keer}, volume={2018}, url={https://tosc.iacr.org/index.php/ToSC/article/view/7359/6529}, DOI={10.13154/tosc.v2018.i4.1-38}, year={2018}, note="[Online; Citované:6.2.2022]" } @misc{xdupdate, title={Xoodyak, an update}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Publication to NIST Lightweight Cryptography Standardization Process (round~…}, url={https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/status-update-sep2020/Xoodyak-update.pdf}, note="[Online; Citované:6.2.2022]" } @misc{xdr1, title={Xoodyak}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Publication to NIST Lightweight Cryptography Standardization Process}, url={https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/Xoodyak-spec.pdf}, note="[Online; Citované:6.2.2022]" } @misc{tkecak, title={Xoodyak}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Team Keccak}, url={https://keccak.team/xoodyak.html}, note="[Online; Citované:6.2.2022]" } @ARTICLE{tls, title={Transport Layer Security}, publisher={Wikipedia}, url={https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3}, note="[Online; Citované: 21.5.2021]" } @article{biks, title={Bezpečnosť v architektúre TCP/IP II (BIKS pr7)}, author={Miloš Drutarovský}, note="[Online; Citované:6.2.2022]" } @article{tcp2, title={5. Prednáška - Transportná vrstva: Protokol TCP}, author={Institute of Computer Science UPJS}, url={https://siete.ics.upjs.sk/prednaska-5/}, note="[Online; Citované:6.2.2022]" } @article{gimli, title={Gimli 2019-03-29}, author={Publication to NIST Lightweight Cryptography Standardization Process}, url={https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/gimli-spec.pdf}, note="[Online; Citované:6.2.2022]" } @article{simpira, title={Simpira v2: A Family of Efficient Permutations Using the AES Round Function}, author={Shay Gueron, Nicky Mouha}, url={https://hal.inria.fr/hal-01403414/document}, note="[Online; Citované:6.2.2022]" } @article{make, title={GNU Make Manual}, author={GNU org.}, url={https://www.gnu.org/software/make/manual/html_node/index.html}, note="[Online; Citované:20.2.2022]" } @article{endianita, title={Endianita}, author={Wikipedia}, url={https://sk.wikipedia.org/wiki/Endianita}, note="[Online; Citované:20.2.2022]" } @article{poll, title={Poll}, author={man7org}, url={https://man7.org/linux/man-pages/man2/poll.2.html}, note="[Online; Citované:20.2.2022]" } @article{ternary, title={Ternary Operator in C Explained}, author={freeCodeCamp.org}, url={https://www.freecodecamp.org/news/c-ternary-operator/}, note="[Online; Citované:20.2.2022]" } @ARTICLE{bufferbloat, title={Bufferbloat}, publisher={Wikipedia}, url={https://en.wikipedia.org/wiki/Bufferbloat}, note="[Online; Citované: 1.3.2021]" } @ARTICLE{aes, title={Advanced Encryption Standard}, publisher={Wikipedia}, url={https://en.wikipedia.org/wiki/Advanced_Encryption_Standard}, note="[Online; Citované: 8.5.2021]" } @book{levicky, title={Kryptografia v informačnej bezpečnosti}, author={Levický, Dušan}, year={2005}, publisher={Elfa} } @misc{kravatte, title={Kravatte}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Team Keccak}, url={https://keccak.team/kravatte.html}, note="[Online; Citované:6.2.2022]" } @misc{keccakp, title={The Keccak-p Permutations}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Team Keccak}, url={https://keccak.team/keccakp.html}, note="[Online; Citované:6.2.2022]" } @misc{kecsup, title={The Keccak-p Permutations}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Team Keccak}, url={https://keccak.team/specifications.html}, note="[Online; Citované:6.2.2022]" } @inproceedings{bernstein2017gimli, title={Gimli: a cross-platform permutation}, author={Bernstein, Daniel J and K{\"o}lbl, Stefan and Lucks, Stefan and Massolino, Pedro Maat Costa and Mendel, Florian and Nawaz, Kashif and Schneider, Tobias and Schwabe, Peter and Standaert, Fran{\c{c}}ois-Xavier and Todo, Yosuke and others}, booktitle={International Conference on Cryptographic Hardware and Embedded Systems}, pages={299--320}, year={2017}, organization={Springer} } @misc{farfalle, title={Farfalle: parallel permutation-based cryptography}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Team Keccak}, url={https://keccak.team/farfalle.html}, note="[Online; Citované:6.2.2022]" } @misc{duplex, title={The sponge and duplex constructions}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Team Keccak}, url={https://keccak.team/sponge_duplex.html}, note="[Online; Citované:6.2.2022]" } @misc{xcb, title={Xoodoo cookbook}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Team Keccak}, url={https://eprint.iacr.org/2018/767.pdf}, note="[Online; Citované:6.2.2022]" } @InProceedings{duplex, author="Daemen, Joan and Mennink, Bart and Van Assche, Gilles", editor="Takagi, Tsuyoshi and Peyrin, Thomas", title="Full-State Keyed Duplex with Built-In Multi-user Support", booktitle="Advances in Cryptology -- ASIACRYPT 2017", year="2017", publisher="Springer International Publishing", address="Cham", pages="606--637", abstract="The keyed duplex construction was introduced by Bertoni et al. (SAC 2011) and recently generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). We present a generalization of the full-state keyed duplex that natively supports multiple instances by design, and perform a security analysis that improves over that of Mennink et al. in terms of a more modular security analysis and a stronger and more adaptive security bound. Via the introduction of an additional parameter to the analysis, our bound demonstrates a significant security improvement in case of nonce-respecting adversaries. Furthermore, by supporting multiple instances by design, instead of adapting the security model to it, we manage to derive a security bound that is largely independent of the number of instances.", isbn="978-3-319-70697-9", url={https://link.springer.com/chapter/10.1007/978-3-319-70697-9_21#citeas}, note="[Online; Citované:6.2.2022]" } @misc{keyak, title={The Keyak authenticated encryption scheme}, author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny}, year={2020}, publisher={Team Keccak}, url={https://keccak.team/keyak.html}, note="[Online; Citované:6.2.2022]" } @ARTICLE{ratchet, title={What is a ratchet?}, publisher={Cryptography StackExcchange}, url={https://crypto.stackexchange.com/questions/39762/what-is-a-ratchet}, note="[Online; Citované: 8.5.2021]" } @ARTICLE{fsec, title={Forward secrecy}, publisher={Wikipedia}, url={https://en.wikipedia.org/wiki/Forward_secrecy}, note="[Online; Citované: 8.5.2021]" } @ARTICLE{sec, title={Security level}, publisher={Wikipedia}, url={https://en.wikipedia.org/wiki/Security_level}, note="[Online; Citované: 8.5.2021]" }