292 lines
10 KiB
BibTeX
292 lines
10 KiB
BibTeX
@article{divvpn,
|
||
author = {Sridevi, Sridevi and D H, Manjaiah},
|
||
year = {2012},
|
||
month = {06},
|
||
pages = {93-96},
|
||
title = {Technical Overview of Virtual Private Networks(VPNs)},
|
||
volume = {2},
|
||
journal = {International Journal of Scientific Research},
|
||
doi = {10.15373/22778179/JULY2013/32},
|
||
url={https://www.researchgate.net/publication/274929918_Technical_Overview_of_Virtual_Private_NetworksVPNs},
|
||
note="[Online; Citované: 22.1.2022]"
|
||
}
|
||
@ARTICLE{vbox,
|
||
title={Oracle VM Virtual Box},
|
||
publisher={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/VirtualBox},
|
||
note="[Online; Citované: 20.1.2022]"
|
||
}
|
||
@ARTICLE{sha2,
|
||
title={Secure Hash Algorithm 2 (SHA-2)},
|
||
publisher={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/SHA-2},
|
||
note="[Online; Citované: 21.5.2021]"
|
||
}
|
||
@ARTICLE{base,
|
||
title={Base64},
|
||
publisher={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/Base64},
|
||
note="[Online; Citované: 21.5.2021]"
|
||
}
|
||
@article{ciscovpn,
|
||
title={Virtual Private Networks Simplified},
|
||
publisher={Cisco},
|
||
url={https://www.cisco.com/c/dam/en_us/training-events/le21/le34/downloads/689/academy/2008/sessions/BRK-134T_VPNs_Simplified.pdf},
|
||
note="[Online; Citované:26.1.2022]"
|
||
}
|
||
@article{vmkonfig,
|
||
title={Installing Windows 10 on Virtualbox 6.1.12 -- FULL PROCESS, 2020 -- video tutorial},
|
||
author={MikeTheTech},
|
||
year={2020},
|
||
url={https://www.youtube.com/watch?v=gKQvaPejxpc&ab_channel=MikeTheTech},
|
||
note="[Online; Citované: 17.5.2021]"
|
||
}
|
||
@article{vbguide,
|
||
title={VirtualBox Network Settings: Complete Guide},
|
||
author={Michael Bose},
|
||
publisher={Nakivo},
|
||
year={2019},
|
||
url={https://www.nakivo.com/blog/virtualbox-network-setting-guide/},
|
||
note="[Online; Citované:26.1.2022]"
|
||
}
|
||
@article{vboracle,
|
||
title={6.2. Introduction to Networking Modes},
|
||
author={Oracle},
|
||
url={https://www.virtualbox.org/manual/ch06.html},
|
||
note="[Online; Citované:26.1.2022]"
|
||
}
|
||
@article{tcp,
|
||
title={Transmission Control Protocol},
|
||
author={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/Transmission_Control_Protocol},
|
||
note="[Online; Citované:26.1.2022]"
|
||
}
|
||
@article{cryptol,
|
||
title={Cryptol -- The Language of Cryptography},
|
||
author={Cryptol},
|
||
url={https://cryptol.net/index.html},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@misc{xoodoocb,
|
||
author = {Joan Daemen and
|
||
Seth Hoffert and
|
||
Michaël Peeters and
|
||
Gilles Van Assche and
|
||
Ronny Van Keer},
|
||
title = {Xoodoo cookbook (2.revision)},
|
||
howpublished = {Cryptology ePrint Archive, Report 2018/767},
|
||
year = {2019},
|
||
url = {https://eprint.iacr.org/2018/767.pdf},
|
||
note = "[Online; Citované:6.2.2022]"
|
||
}
|
||
@article{xd,
|
||
title={The design of Xoodoo and Xoofff},
|
||
author = {Joan Daemen, Seth Hoffert, Gilles Van Assche and Ronny Van Keer},
|
||
volume={2018},
|
||
url={https://tosc.iacr.org/index.php/ToSC/article/view/7359/6529},
|
||
DOI={10.13154/tosc.v2018.i4.1-38},
|
||
year={2018},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
|
||
@misc{xdupdate,
|
||
title={Xoodyak, an update},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Publication to NIST Lightweight Cryptography Standardization Process (round~…},
|
||
url={https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/status-update-sep2020/Xoodyak-update.pdf},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@misc{xdr1,
|
||
title={Xoodyak},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Publication to NIST Lightweight Cryptography Standardization Process},
|
||
url={https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/Xoodyak-spec.pdf},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@misc{tkecak,
|
||
title={Xoodyak},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Team Keccak},
|
||
url={https://keccak.team/xoodyak.html},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@ARTICLE{tls,
|
||
title={Transport Layer Security},
|
||
publisher={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3},
|
||
note="[Online; Citované: 21.5.2021]"
|
||
}
|
||
@article{biks,
|
||
title={Bezpečnosť v architektúre TCP/IP II (BIKS pr7)},
|
||
author={Miloš Drutarovský},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@article{tcp2,
|
||
title={5. Prednáška - Transportná vrstva: Protokol TCP},
|
||
author={Institute of Computer Science UPJS},
|
||
url={https://siete.ics.upjs.sk/prednaska-5/},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@article{gimli,
|
||
title={Gimli 2019-03-29},
|
||
author={Publication to NIST Lightweight Cryptography Standardization Process},
|
||
url={https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/gimli-spec.pdf},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
|
||
@article{simpira,
|
||
title={Simpira v2: A Family of Efficient Permutations Using the AES Round Function},
|
||
author={Shay Gueron, Nicky Mouha},
|
||
url={https://hal.inria.fr/hal-01403414/document},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
|
||
@article{make,
|
||
title={GNU Make Manual},
|
||
author={GNU org.},
|
||
url={https://www.gnu.org/software/make/manual/html_node/index.html},
|
||
note="[Online; Citované:20.2.2022]"
|
||
}
|
||
@article{endianita,
|
||
title={Endianita},
|
||
author={Wikipedia},
|
||
url={https://sk.wikipedia.org/wiki/Endianita},
|
||
note="[Online; Citované:20.2.2022]"
|
||
}
|
||
@article{poll,
|
||
title={Poll},
|
||
author={man7org},
|
||
url={https://man7.org/linux/man-pages/man2/poll.2.html},
|
||
note="[Online; Citované:20.2.2022]"
|
||
}
|
||
|
||
@article{ternary,
|
||
title={Ternary Operator in C Explained},
|
||
author={freeCodeCamp.org},
|
||
url={https://www.freecodecamp.org/news/c-ternary-operator/},
|
||
note="[Online; Citované:20.2.2022]"
|
||
}
|
||
@ARTICLE{bufferbloat,
|
||
title={Bufferbloat},
|
||
publisher={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/Bufferbloat},
|
||
note="[Online; Citované: 1.3.2021]"
|
||
}
|
||
@ARTICLE{aes,
|
||
title={Advanced Encryption Standard},
|
||
publisher={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/Advanced_Encryption_Standard},
|
||
note="[Online; Citované: 8.5.2021]"
|
||
}
|
||
@book{levicky,
|
||
title={Kryptografia v informačnej bezpečnosti},
|
||
author={Levický, Dušan},
|
||
year={2005},
|
||
publisher={Elfa}
|
||
}
|
||
|
||
@misc{kravatte,
|
||
title={Kravatte},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Team Keccak},
|
||
url={https://keccak.team/kravatte.html},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
|
||
@misc{keccakp,
|
||
title={The Keccak-p Permutations},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Team Keccak},
|
||
url={https://keccak.team/keccakp.html},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
|
||
@misc{kecsup,
|
||
title={The Keccak-p Permutations},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Team Keccak},
|
||
url={https://keccak.team/specifications.html},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@inproceedings{bernstein2017gimli,
|
||
title={Gimli: a cross-platform permutation},
|
||
author={Bernstein, Daniel J and K{\"o}lbl, Stefan and Lucks, Stefan and Massolino, Pedro Maat Costa and Mendel, Florian and Nawaz, Kashif and Schneider, Tobias and Schwabe, Peter and Standaert, Fran{\c{c}}ois-Xavier and Todo, Yosuke and others},
|
||
booktitle={International Conference on Cryptographic Hardware and Embedded Systems},
|
||
pages={299--320},
|
||
year={2017},
|
||
organization={Springer}
|
||
}
|
||
@misc{farfalle,
|
||
title={Farfalle: parallel permutation-based cryptography},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Team Keccak},
|
||
url={https://keccak.team/farfalle.html},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@misc{duplex,
|
||
title={The sponge and duplex constructions},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Team Keccak},
|
||
url={https://keccak.team/sponge_duplex.html},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@misc{xcb,
|
||
title={Xoodoo cookbook},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Team Keccak},
|
||
url={https://eprint.iacr.org/2018/767.pdf},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@InProceedings{duplex,
|
||
author="Daemen, Joan
|
||
and Mennink, Bart
|
||
and Van Assche, Gilles",
|
||
editor="Takagi, Tsuyoshi
|
||
and Peyrin, Thomas",
|
||
title="Full-State Keyed Duplex with Built-In Multi-user Support",
|
||
booktitle="Advances in Cryptology -- ASIACRYPT 2017",
|
||
year="2017",
|
||
publisher="Springer International Publishing",
|
||
address="Cham",
|
||
pages="606--637",
|
||
abstract="The keyed duplex construction was introduced by Bertoni et al. (SAC 2011) and recently generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). We present a generalization of the full-state keyed duplex that natively supports multiple instances by design, and perform a security analysis that improves over that of Mennink et al. in terms of a more modular security analysis and a stronger and more adaptive security bound. Via the introduction of an additional parameter to the analysis, our bound demonstrates a significant security improvement in case of nonce-respecting adversaries. Furthermore, by supporting multiple instances by design, instead of adapting the security model to it, we manage to derive a security bound that is largely independent of the number of instances.",
|
||
isbn="978-3-319-70697-9",
|
||
url={https://link.springer.com/chapter/10.1007/978-3-319-70697-9_21#citeas},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@misc{keyak,
|
||
title={The Keyak authenticated encryption scheme},
|
||
author={Daemen, Joan and Hoffert, Seth and Mella, Silvia and Peeters, Micha{\"e}l and Van Assche, Gilles and Van Keer, Ronny},
|
||
year={2020},
|
||
publisher={Team Keccak},
|
||
url={https://keccak.team/keyak.html},
|
||
note="[Online; Citované:6.2.2022]"
|
||
}
|
||
@ARTICLE{ratchet,
|
||
title={What is a ratchet?},
|
||
publisher={Cryptography StackExcchange},
|
||
url={https://crypto.stackexchange.com/questions/39762/what-is-a-ratchet},
|
||
note="[Online; Citované: 8.5.2021]"
|
||
}
|
||
@ARTICLE{fsec,
|
||
title={Forward secrecy},
|
||
publisher={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/Forward_secrecy},
|
||
note="[Online; Citované: 8.5.2021]"
|
||
}
|
||
@ARTICLE{sec,
|
||
title={Security level},
|
||
publisher={Wikipedia},
|
||
url={https://en.wikipedia.org/wiki/Security_level},
|
||
note="[Online; Citované: 8.5.2021]"
|
||
}
|