DiplomaWork/templates/chapters/bibliography.bib
2022-05-13 20:52:39 +02:00

292 lines
10 KiB
BibTeX
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@article{divvpn,
author = {Sridevi, Sridevi and D H, Manjaiah},
year = {2012},
month = {06},
pages = {93-96},
title = {Technical Overview of Virtual Private Networks(VPNs)},
volume = {2},
journal = {International Journal of Scientific Research},
doi = {10.15373/22778179/JULY2013/32},
url={https://www.researchgate.net/publication/274929918_Technical_Overview_of_Virtual_Private_NetworksVPNs},
note="[Online; Citované: 22.1.2022]"
}
@ARTICLE{vbox,
title={Oracle VM Virtual Box},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/VirtualBox},
note="[Online; Citované: 20.1.2022]"
}
@ARTICLE{sha2,
title={Secure Hash Algorithm 2 (SHA-2)},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/SHA-2},
note="[Online; Citované: 21.5.2021]"
}
@ARTICLE{base,
title={Base64},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Base64},
note="[Online; Citované: 21.5.2021]"
}
@article{ciscovpn,
title={Virtual Private Networks Simplified},
publisher={Cisco},
url={https://www.cisco.com/c/dam/en_us/training-events/le21/le34/downloads/689/academy/2008/sessions/BRK-134T_VPNs_Simplified.pdf},
note="[Online; Citované:26.1.2022]"
}
@article{vmkonfig,
title={Installing Windows 10 on Virtualbox 6.1.12 -- FULL PROCESS, 2020 -- video tutorial},
author={MikeTheTech},
year={2020},
url={https://www.youtube.com/watch?v=gKQvaPejxpc&ab_channel=MikeTheTech},
note="[Online; Citované: 17.5.2021]"
}
@article{vbguide,
title={VirtualBox Network Settings: Complete Guide},
author={Michael Bose},
publisher={Nakivo},
year={2019},
url={https://www.nakivo.com/blog/virtualbox-network-setting-guide/},
note="[Online; Citované:26.1.2022]"
}
@article{vboracle,
title={6.2. Introduction to Networking Modes},
author={Oracle},
url={https://www.virtualbox.org/manual/ch06.html},
note="[Online; Citované:26.1.2022]"
}
@article{tcp,
title={Transmission Control Protocol},
author={Wikipedia},
url={https://en.wikipedia.org/wiki/Transmission_Control_Protocol},
note="[Online; Citované:26.1.2022]"
}
@article{cryptol,
title={Cryptol -- The Language of Cryptography},
author={Cryptol},
url={https://cryptol.net/index.html},
note="[Online; Citované:6.2.2022]"
}
@misc{xoodoocb,
author = {Joan Daemen and
Seth Hoffert and
Michaël Peeters and
Gilles Van Assche and
Ronny Van Keer},
title = {Xoodoo cookbook (2.revision)},
howpublished = {Cryptology ePrint Archive, Report 2018/767},
year = {2019},
url = {https://eprint.iacr.org/2018/767.pdf},
note = "[Online; Citované:6.2.2022]"
}
@article{xd,
title={The design of Xoodoo and Xoofff},
author = {Joan Daemen, Seth Hoffert, Gilles Van Assche and Ronny Van Keer},
volume={2018},
url={https://tosc.iacr.org/index.php/ToSC/article/view/7359/6529},
DOI={10.13154/tosc.v2018.i4.1-38},
year={2018},
note="[Online; Citované:6.2.2022]"
}
@misc{xdupdate,
title={Xoodyak, an update},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Publication to NIST Lightweight Cryptography Standardization Process (round~…},
url={https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/status-update-sep2020/Xoodyak-update.pdf},
note="[Online; Citované:6.2.2022]"
}
@misc{xdr1,
title={Xoodyak},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Publication to NIST Lightweight Cryptography Standardization Process},
url={https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/Xoodyak-spec.pdf},
note="[Online; Citované:6.2.2022]"
}
@misc{tkecak,
title={Xoodyak},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/xoodyak.html},
note="[Online; Citované:6.2.2022]"
}
@ARTICLE{tls,
title={Transport Layer Security},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3},
note="[Online; Citované: 21.5.2021]"
}
@article{biks,
title={Bezpečnosť v architektúre TCP/IP II (BIKS pr7)},
author={Miloš Drutarovský},
note="[Online; Citované:6.2.2022]"
}
@article{tcp2,
title={5. Prednáška - Transportná vrstva: Protokol TCP},
author={Institute of Computer Science UPJS},
url={https://siete.ics.upjs.sk/prednaska-5/},
note="[Online; Citované:6.2.2022]"
}
@article{gimli,
title={Gimli 2019-03-29},
author={Publication to NIST Lightweight Cryptography Standardization Process},
url={https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/gimli-spec.pdf},
note="[Online; Citované:6.2.2022]"
}
@article{simpira,
title={Simpira v2: A Family of Efficient Permutations Using the AES Round Function},
author={Shay Gueron, Nicky Mouha},
url={https://hal.inria.fr/hal-01403414/document},
note="[Online; Citované:6.2.2022]"
}
@article{make,
title={GNU Make Manual},
author={GNU org.},
url={https://www.gnu.org/software/make/manual/html_node/index.html},
note="[Online; Citované:20.2.2022]"
}
@article{endianita,
title={Endianita},
author={Wikipedia},
url={https://sk.wikipedia.org/wiki/Endianita},
note="[Online; Citované:20.2.2022]"
}
@article{poll,
title={Poll},
author={man7org},
url={https://man7.org/linux/man-pages/man2/poll.2.html},
note="[Online; Citované:20.2.2022]"
}
@article{ternary,
title={Ternary Operator in C Explained},
author={freeCodeCamp.org},
url={https://www.freecodecamp.org/news/c-ternary-operator/},
note="[Online; Citované:20.2.2022]"
}
@ARTICLE{bufferbloat,
title={Bufferbloat},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Bufferbloat},
note="[Online; Citované: 1.3.2021]"
}
@ARTICLE{aes,
title={Advanced Encryption Standard},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Advanced_Encryption_Standard},
note="[Online; Citované: 8.5.2021]"
}
@book{levicky,
title={Kryptografia v informačnej bezpečnosti},
author={Levický, Dušan},
year={2005},
publisher={Elfa}
}
@misc{kravatte,
title={Kravatte},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/kravatte.html},
note="[Online; Citované:6.2.2022]"
}
@misc{keccakp,
title={The Keccak-p Permutations},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/keccakp.html},
note="[Online; Citované:6.2.2022]"
}
@misc{kecsup,
title={The Keccak-p Permutations},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/specifications.html},
note="[Online; Citované:6.2.2022]"
}
@inproceedings{bernstein2017gimli,
title={Gimli: a cross-platform permutation},
author={Bernstein, Daniel J and K{\"o}lbl, Stefan and Lucks, Stefan and Massolino, Pedro Maat Costa and Mendel, Florian and Nawaz, Kashif and Schneider, Tobias and Schwabe, Peter and Standaert, Fran{\c{c}}ois-Xavier and Todo, Yosuke and others},
booktitle={International Conference on Cryptographic Hardware and Embedded Systems},
pages={299--320},
year={2017},
organization={Springer}
}
@misc{farfalle,
title={Farfalle: parallel permutation-based cryptography},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/farfalle.html},
note="[Online; Citované:6.2.2022]"
}
@misc{duplex,
title={The sponge and duplex constructions},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/sponge_duplex.html},
note="[Online; Citované:6.2.2022]"
}
@misc{xcb,
title={Xoodoo cookbook},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://eprint.iacr.org/2018/767.pdf},
note="[Online; Citované:6.2.2022]"
}
@InProceedings{duplex,
author="Daemen, Joan
and Mennink, Bart
and Van Assche, Gilles",
editor="Takagi, Tsuyoshi
and Peyrin, Thomas",
title="Full-State Keyed Duplex with Built-In Multi-user Support",
booktitle="Advances in Cryptology -- ASIACRYPT 2017",
year="2017",
publisher="Springer International Publishing",
address="Cham",
pages="606--637",
abstract="The keyed duplex construction was introduced by Bertoni et al. (SAC 2011) and recently generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). We present a generalization of the full-state keyed duplex that natively supports multiple instances by design, and perform a security analysis that improves over that of Mennink et al. in terms of a more modular security analysis and a stronger and more adaptive security bound. Via the introduction of an additional parameter to the analysis, our bound demonstrates a significant security improvement in case of nonce-respecting adversaries. Furthermore, by supporting multiple instances by design, instead of adapting the security model to it, we manage to derive a security bound that is largely independent of the number of instances.",
isbn="978-3-319-70697-9",
url={https://link.springer.com/chapter/10.1007/978-3-319-70697-9_21#citeas},
note="[Online; Citované:6.2.2022]"
}
@misc{keyak,
title={The Keyak authenticated encryption scheme},
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
year={2020},
publisher={Team Keccak},
url={https://keccak.team/keyak.html},
note="[Online; Citované:6.2.2022]"
}
@ARTICLE{ratchet,
title={What is a ratchet?},
publisher={Cryptography StackExcchange},
url={https://crypto.stackexchange.com/questions/39762/what-is-a-ratchet},
note="[Online; Citované: 8.5.2021]"
}
@ARTICLE{fsec,
title={Forward secrecy},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Forward_secrecy},
note="[Online; Citované: 8.5.2021]"
}
@ARTICLE{sec,
title={Security level},
publisher={Wikipedia},
url={https://en.wikipedia.org/wiki/Security_level},
note="[Online; Citované: 8.5.2021]"
}