|
[1] R. Venkateswaran, “Virtual private networks,” IEEE potentials, vol. 20, no. 1, pp. 11–15, 2001.
[2] C. Scott, P. Wolfe, and M. Erwin, Virtual private networks. ” O’Reilly Media, Inc.”, 1999.
[3] J. A. Donenfeld, “Wireguard: next generation kernel network tunnel.” in NDSS, 2017, pp. 1–12.
[4] T. Perrin, “The noise protocol framework,” PowerPoint Presentation, 2018.
[5] S. Mackey, I. Mihov, A. Nosenko, F. Vega, and Y. Cheng, “A performance comparison of wireguard and openvpn,” in Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 2020, pp. 162–164.
[6] A. Abdulazeez, B. Salim, D. Zeebaree, and D. Doghramachi, “Comparison of vpn proto- cols at network layer focusing on wire guard protocol,” 2020.
[7] P. N. P. Hai, H. N. Hong, B. B. Quoc, and T. Hoang, “A comparative research on vpn tech- nologies on operating system for routers,” in 2021 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2021, pp. 89–93.
[8] E. Dekker and P. Spaans, “Performance comparison of vpn implementations wireguard, strongswan, and openvpn in a 1 gbit/s environment.”
[9] M. Feilner, OpenVPN: Building and integrating virtual private networks. Packt Publish- ing Ltd, 2006.
[10] J. G. Ivan Pepelnjak and J. Apcar, MPLS and VPN Architectures. Cisco Systems, 2003, vol. 4.
[11] J. Appelbaum, C. Martindale, and P. Wu, “Tiny wireguard tweak,” in International Con- ference on Cryptology in Africa. Springer, 2019, pp. 3–20. [12] J. Paillisse, A. Barcia, A. Lopez, A. Rodriguez-Natal, F. Maino, and A. Cabellos, “A con- trol plane for wireguard,” in 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, 2021, pp. 1–8.
[13] S. Kurniadi, E. Utami, and F. Wibowo, “Building dynamic mesh vpn network using mikrotik router,” in Journal of Physics: Conference Series, vol. 1140, no. 1. IOP Pub- lishing, 2018, p. 012039.
[14] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
[15] B. Blanchet, B. Smyth, V. Cheval, and M. Sylvestre, “Proverif 2.00: automatic crypto- graphic protocol verifier, user manual and tutorial,” Version from, pp. 05–16, 2018.
[16] N. Kobeissi, G. Nicolas, and K. Bhargavan, “Noise explorer: Fully automated modeling and verification for arbitrary noise protocols,” in 2019 IEEE European Symposium on Se- curity and Privacy (EuroS&P). IEEE, 2019, pp. 356–370.
[17] slackhq/nebula, “A scalable overlay networking tool with a focus on performance, simplicity and security.” [Online]. Available: https://github.com/slackhq/nebula
[18] N. Lemnouar, “Security limitations of shamir's secret sharing,” Journal of Discrete Math- ematical Sciences and Cryptography, pp. 1–13, 2022.
[19] F. T. Penney., “Original c implementation of shamir’s secret sharing algorithm. original source code.” [Online]. Available: https://github.com/fletcher/c-sss
[20] J. K. Arbogast, I. B. Sumner, and M. O. Lam, “Parallelizing shamir’s secret sharing algo- rithm,” Journal of Computing Sciences in Colleges, vol. 33, no. 3, pp. 12–18, 2018.
|