TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 12031

Symmetric Cryptography

( 15. Jan – 20. Jan, 2012 )


Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/12031

Organisatoren

Kontakt


Programm

Summary

Research in Symmetric Cryptography is quickly evolving. The seminar was the third of its kind, the first one took place in 2007, the second in 2009. We observe a steadily increasing interest in Symmetric Cryptography, as well as a growing practical demand for symmetric algorithms and protocols. The seminar was very successful in discussing recent results and sharing new ideas. Furthermore, it inspired the participants to consider how Symmetric Cryptography has evolved in the past, and how they would like it to evolve in the future.

Two intense discussions dealt with Authenticated Encryption and the issue of a 'valid' attack on a symmetric primitive.

The participants agreed on Authenticated Encryption becoming a major research topic for Symmetric Cyptography in the next few years, because current Authenticated Encryption Schemes are not always suitable for practical demands -- escpecially are the relevant attack modes and models not yet well-understood (e.g., misuse attacks, blockwise adaptive attacks, etc.)

Regarding the issue of 'valid' attacks, the participants agreed that the current development of academic cryptanalysis with a growing number of increasingly 'marginal' attacks, is unsatisfactory.


Teilnehmer
  • Elena Andreeva (KU Leuven, BE) [dblp]
  • Frederik Armknecht (Universität Mannheim, DE) [dblp]
  • Jean-Philippe Aumasson (Kudelski Security - Cheseaux, CH) [dblp]
  • Daniel J. Bernstein (University of Illinois - Chicago, US) [dblp]
  • Eli Biham (Technion - Haifa, IL) [dblp]
  • Alex Biryukov (University of Luxembourg, LU) [dblp]
  • Andrey Bogdanov (KU Leuven, BE) [dblp]
  • Joan Daemen (STMicroelectronics - Zaventem, BE) [dblp]
  • Itai Dinur (Weizmann Institute - Rehovot, IL) [dblp]
  • Yevgeniy Dodis (New York University, US) [dblp]
  • Orr Dunkelman (University of Haifa, IL) [dblp]
  • Marc Fischlin (TU Darmstadt, DE) [dblp]
  • Ewan Fleischmann (Bauhaus-Universität Weimar, DE)
  • Christian Forler (Bauhaus-Universität Weimar, DE) [dblp]
  • Matthias Hamann (Universität Mannheim, DE) [dblp]
  • Tetsu Iwata (Nagoya University, JP) [dblp]
  • Antoine Joux (University of Versailles, FR) [dblp]
  • Lars Ramkilde Knudsen (Technical University of Denmark - Lyngby, DK) [dblp]
  • Matthias Krause (Universität Mannheim, DE) [dblp]
  • Rodolphe Lampe (University of Versailles, FR) [dblp]
  • Nils Gregor Leander (Technical University of Denmark - Lyngby, DK) [dblp]
  • Stefan Lucks (Bauhaus-Universität Weimar, DE) [dblp]
  • Florian Mendel (KU Leuven, BE) [dblp]
  • Vasily Mikhalev (Universität Mannheim, DE) [dblp]
  • Tilo Müller (Universität Erlangen-Nürnberg, DE) [dblp]
  • Maria Naya-Plasencia (University of Versailles, FR) [dblp]
  • Kaisa Nyberg (Aalto University, FI) [dblp]
  • Jacques Patarin (University of Versailles, FR) [dblp]
  • Kenneth G. Paterson (Royal Holloway University of London, GB) [dblp]
  • Bart Preneel (KU Leuven, BE) [dblp]
  • Christian Rechberger (ENS - Paris, FR) [dblp]
  • Phillip Rogaway (University of California - Davis, US) [dblp]
  • Greg Rose (Qualcomm Inc. - San Diego, US) [dblp]
  • Sondre Rønjom (NSM Norway - Bærum, NO)
  • Yu Sasaki (NTT Labs - Tokyo, JP) [dblp]
  • Adi Shamir (Weizmann Institute - Rehovot, IL) [dblp]
  • Kyoji Shibutani (Sony - Tokyo, JP)
  • Martijn Stam (University of Bristol, GB) [dblp]
  • John Steinberger (Tsinghua University - Beijing, CN) [dblp]
  • Deniz Toz (KU Leuven, BE)
  • Kerem Varici (KU Leuven, BE)
  • Bogdan Warinschi (University of Bristol, GB) [dblp]
  • Jakob Wenzel (Bauhaus-Universität Weimar, DE) [dblp]
  • Kan Yasuda (NTT Labs - Tokyo, JP) [dblp]
  • Erik Zenner (Hochschule Offenburg, DE)

Verwandte Seminare
  • Dagstuhl-Seminar 07021: Symmetric Cryptography (2007-01-07 - 2007-01-12) (Details)
  • Dagstuhl-Seminar 09031: Symmetric Cryptography (2009-01-11 - 2009-01-16) (Details)
  • Dagstuhl-Seminar 14021: Symmetric Cryptography (2014-01-05 - 2014-01-10) (Details)
  • Dagstuhl-Seminar 16021: Symmetric Cryptography (2016-01-10 - 2016-01-15) (Details)
  • Dagstuhl-Seminar 18021: Symmetric Cryptography (2018-01-07 - 2018-01-12) (Details)
  • Dagstuhl-Seminar 20041: Symmetric Cryptography (2020-01-19 - 2020-01-24) (Details)
  • Dagstuhl-Seminar 22141: Symmetric Cryptography (2022-04-03 - 2022-04-08) (Details)
  • Dagstuhl-Seminar 24041: Symmetric Cryptography (2024-01-21 - 2024-01-26) (Details)

Klassifikation
  • Security
  • Cryptography

Schlagworte
  • Authenticity
  • Integrity
  • Privacy
  • Hash Functions
  • Ciphers
  • Provable Security
  • Cryptanalysis