TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Dagstuhl Seminar 12031

Symmetric Cryptography

( Jan 15 – Jan 20, 2012 )

(Click in the middle of the image to enlarge)

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/12031

Organizers

Contact


Schedule

Summary

Research in Symmetric Cryptography is quickly evolving. The seminar was the third of its kind, the first one took place in 2007, the second in 2009. We observe a steadily increasing interest in Symmetric Cryptography, as well as a growing practical demand for symmetric algorithms and protocols. The seminar was very successful in discussing recent results and sharing new ideas. Furthermore, it inspired the participants to consider how Symmetric Cryptography has evolved in the past, and how they would like it to evolve in the future.

Two intense discussions dealt with Authenticated Encryption and the issue of a 'valid' attack on a symmetric primitive.

The participants agreed on Authenticated Encryption becoming a major research topic for Symmetric Cyptography in the next few years, because current Authenticated Encryption Schemes are not always suitable for practical demands -- escpecially are the relevant attack modes and models not yet well-understood (e.g., misuse attacks, blockwise adaptive attacks, etc.)

Regarding the issue of 'valid' attacks, the participants agreed that the current development of academic cryptanalysis with a growing number of increasingly 'marginal' attacks, is unsatisfactory.


Participants
  • Elena Andreeva (KU Leuven, BE) [dblp]
  • Frederik Armknecht (Universität Mannheim, DE) [dblp]
  • Jean-Philippe Aumasson (Kudelski Security - Cheseaux, CH) [dblp]
  • Daniel J. Bernstein (University of Illinois - Chicago, US) [dblp]
  • Eli Biham (Technion - Haifa, IL) [dblp]
  • Alex Biryukov (University of Luxembourg, LU) [dblp]
  • Andrey Bogdanov (KU Leuven, BE) [dblp]
  • Joan Daemen (STMicroelectronics - Zaventem, BE) [dblp]
  • Itai Dinur (Weizmann Institute - Rehovot, IL) [dblp]
  • Yevgeniy Dodis (New York University, US) [dblp]
  • Orr Dunkelman (University of Haifa, IL) [dblp]
  • Marc Fischlin (TU Darmstadt, DE) [dblp]
  • Ewan Fleischmann (Bauhaus-Universität Weimar, DE)
  • Christian Forler (Bauhaus-Universität Weimar, DE) [dblp]
  • Matthias Hamann (Universität Mannheim, DE) [dblp]
  • Tetsu Iwata (Nagoya University, JP) [dblp]
  • Antoine Joux (University of Versailles, FR) [dblp]
  • Lars Ramkilde Knudsen (Technical University of Denmark - Lyngby, DK) [dblp]
  • Matthias Krause (Universität Mannheim, DE) [dblp]
  • Rodolphe Lampe (University of Versailles, FR) [dblp]
  • Nils Gregor Leander (Technical University of Denmark - Lyngby, DK) [dblp]
  • Stefan Lucks (Bauhaus-Universität Weimar, DE) [dblp]
  • Florian Mendel (KU Leuven, BE) [dblp]
  • Vasily Mikhalev (Universität Mannheim, DE) [dblp]
  • Tilo Müller (Universität Erlangen-Nürnberg, DE) [dblp]
  • Maria Naya-Plasencia (University of Versailles, FR) [dblp]
  • Kaisa Nyberg (Aalto University, FI) [dblp]
  • Jacques Patarin (University of Versailles, FR) [dblp]
  • Kenneth G. Paterson (Royal Holloway University of London, GB) [dblp]
  • Bart Preneel (KU Leuven, BE) [dblp]
  • Christian Rechberger (ENS - Paris, FR) [dblp]
  • Phillip Rogaway (University of California - Davis, US) [dblp]
  • Greg Rose (Qualcomm Inc. - San Diego, US) [dblp]
  • Sondre Rønjom (NSM Norway - Bærum, NO)
  • Yu Sasaki (NTT Labs - Tokyo, JP) [dblp]
  • Adi Shamir (Weizmann Institute - Rehovot, IL) [dblp]
  • Kyoji Shibutani (Sony - Tokyo, JP)
  • Martijn Stam (University of Bristol, GB) [dblp]
  • John Steinberger (Tsinghua University - Beijing, CN) [dblp]
  • Deniz Toz (KU Leuven, BE)
  • Kerem Varici (KU Leuven, BE)
  • Bogdan Warinschi (University of Bristol, GB) [dblp]
  • Jakob Wenzel (Bauhaus-Universität Weimar, DE) [dblp]
  • Kan Yasuda (NTT Labs - Tokyo, JP) [dblp]
  • Erik Zenner (Hochschule Offenburg, DE)

Related Seminars
  • Dagstuhl Seminar 07021: Symmetric Cryptography (2007-01-07 - 2007-01-12) (Details)
  • Dagstuhl Seminar 09031: Symmetric Cryptography (2009-01-11 - 2009-01-16) (Details)
  • Dagstuhl Seminar 14021: Symmetric Cryptography (2014-01-05 - 2014-01-10) (Details)
  • Dagstuhl Seminar 16021: Symmetric Cryptography (2016-01-10 - 2016-01-15) (Details)
  • Dagstuhl Seminar 18021: Symmetric Cryptography (2018-01-07 - 2018-01-12) (Details)
  • Dagstuhl Seminar 20041: Symmetric Cryptography (2020-01-19 - 2020-01-24) (Details)
  • Dagstuhl Seminar 22141: Symmetric Cryptography (2022-04-03 - 2022-04-08) (Details)
  • Dagstuhl Seminar 24041: Symmetric Cryptography (2024-01-21 - 2024-01-26) (Details)

Classification
  • Security
  • Cryptography

Keywords
  • Authenticity
  • Integrity
  • Privacy
  • Hash Functions
  • Ciphers
  • Provable Security
  • Cryptanalysis