TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Research Meeting 11262

International View of the State-of-the-Art of Cryptography and Security and its Use in Practice

( Jun 26 – Jul 01, 2011 )

(Click in the middle of the image to enlarge)

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/11262

Organizers


Shared Documents

Schedule

Motivation

Electronic processes with data and application residing all over the world is the reality of today. Trustworthy information systems, and in particular secure computation, are necessary for the viability of this environment. Secure computation needs to be performed in a way that continues to develop the strength of the underlying security building blocks, from ciphers to operating systems and hardware platforms. Global interoperability is necessary to ensure secure computation can be used worldwide. In this context, cryptography is fundamental for even basic cybersecurity activities now that individuals integrate the use of the internet and computing products into more areas of their lives.

As the diversity of electronic processes increases, so does the diversity of devices and networks. Low power devices and networks that connect them need to develop new frameworks and technologies for lightweight cryptography and security computation in this context. The attack vectors change with the increase in the application of cryptography and other security technologies, and it becomes necessary to expend additional effort on developing more resilient cryptography and security systems.

While cryptography is being used ubiquitously to address security threats, country specific policies, standards and regulations on cryptography have the potential to impede the globally interoperable deployment of technology products including cryptography.

The purpose of this workshop is to bring together prominent and junior cryptographers and IT security experts from all over the world to have an open discussion on advances in cryptography and security, state of the art technologies in secure computation and trusted execution environment, security for the Internet of things, issues associated with global applications of cryptography and security technologies, as well as new applications of cryptography in innovative technology areas operating in distributed environment, such as cloud computing.

The workshop will have an additional focus on the feasibility and practical use of the recent results in cryptography and security research.

Topics

The topics include (but are not limited to) the following subjects:

  • Secret versus public ciphers
  • Cipher and algorithm development process
  • Algorithms maturity and review
  • Lightweight cryptography
  • New requirements for cryptography for novel applications
  • New approaches in cryptography
  • Cipher implementation and interoperability
  • Secure function and multiparty computation
  • Resilient cryptography
  • Secure computation
  • Trust establishment and provable trust
  • Cryptography and privacy
  • And related/adjacent topics, such as security in cloud computing and distributed systems