Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Within this website:
External resources:
Within this website:
External resources:
  • the dblp Computer Science Bibliography

Dagstuhl Seminar 07381


( Sep 16 – Sep 21, 2007 )

(Click in the middle of the image to enlarge)

Please use the following short url to reference this page:


Press Room

Press Review

  • Verschlüsselung - Computerexperten auf Schloss Dagstuhl.
    Bericht von Jürgen Rinner, 24.09.2007, Aktueller Bericht im Saarländischen Fernsehen.

Press Release

Kryptographen tüfteln an neuen Verschlüsselungstechniken
10.09.07(German only)


Cryptography is of paramount importance for information security. Cryptographic primitives are the core building blocks for constructing secure systems. The last three decades have seen tremendous progress in cryptography and the field has substantially matured. Major achievements include the proposal of adequate security definitions, of new cryptographic schemes, and of security proofs for these schemes, relative to the security definition. As a consequence, cryptography has shifted from an ad-hoc discipline with many interesting tricks and ideas to a mathematically rigorous science. Despite this progress many essential problems in cryptography still remain open and new areas and topics arise constantly. The field is more lively than ever before.

While the number of scientific conferences focusing on cryptography is increasing, most of these meetings have a broad focus, and due to a growing interest by practitioners, the number of non-expert attendees has increased. As a result, it becomes more difficult to discuss the details of the advancement of the field, as well as to identify promising innovative trends. Therefore, the aim of the seminar was to provide an opportunity for key cryptographers to meet, to interact, to focus on the scientific foundation of cryptography, to spot the emerging new areas, and to work on them. Applications were also covered but the emphasis was on the conceptual framework that allows the use of appropriate models, amenable to mathematical reasoning.

The seminar brought together about 40 leading cryptographers from all over the world. Almost all participants gave a presentation about their recent research and also about future research plans they have, encouraging others to join in. In many cases the choice of the subject for the talk was targeted to the unique list of participants. The presentations were highly interactive and led to lively discussions, well into the evenings and nights. A number of new collaborations were initiated at the seminar. Overall, the seminar was a great success, as is also documented by the feedback given by the participants on the questionnaires.

The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols, etc.) and in terms of the mathematical methods and techniques used (algebra, number theory, elliptic curves, probability theory, information theory, combinatorics, quantum theory, etc.). The range of applications addressed in the various talks was broad, ranging from secure communication, key management, authentication, digital signatures and payment systems to e-voting and Internet security.

While the initial plan had been to focus more exclusively on public-key cryptography, it turned out that this sub-topic branches out into many other areas of cryptography and therefore the organizers decided to expand the scope, emphasizing quality rather than close adherence to public-key cryptography. This decision turned out to be a wise one.

What was common to almost all the talks is that rigorous mathematical proofs for the security of the presented schemes were given. In fact, a central topic of many of the talks were proof methodologies for various contexts.

  • Eli Biham (Technion - Haifa, IL) [dblp]
  • Johannes Blömer (Universität Paderborn, DE)
  • Dan Boneh (Stanford University, US) [dblp]
  • Ran Canetti (IBM TJ Watson Research Center - Hawthorne, US) [dblp]
  • Melissa Chase (Brown University - Providence, US) [dblp]
  • Ronald Cramer (CWI - Amsterdam, NL)
  • Robbert de Haan (CWI - Amsterdam, NL)
  • Yvo Desmedt (Univ. College London, GB)
  • Yevgeniy Dodis (New York University, US) [dblp]
  • Serge Fehr (CWI - Amsterdam, NL) [dblp]
  • Marc Fischlin (TU Darmstadt, DE) [dblp]
  • Matthias Fitzi (ETH Zürich, CH)
  • Oded Goldreich (Weizmann Institute - Rehovot, IL) [dblp]
  • Shai Halevi (IBM TJ Watson Research Center - Yorktown Heights, US) [dblp]
  • Johan Hastad (KTH Royal Institute of Technology, SE) [dblp]
  • Dennis Hofheinz (CWI - Amsterdam, NL) [dblp]
  • Yuval Ishai (Technion - Haifa, IL) [dblp]
  • Stanislaw Jarecki (University of California - Irvine, US)
  • Eike Kiltz (CWI - Amsterdam, NL) [dblp]
  • Eyal Kushilevitz (Technion - Haifa, IL)
  • Ueli Maurer (ETH Zürich, CH) [dblp]
  • Alexander May (TU Darmstadt, DE) [dblp]
  • Rafail Ostrovsky (UCLA, US)
  • Rafael Pass (Cornell University, US) [dblp]
  • Jacques Patarin (University of Versailles, FR) [dblp]
  • Krzysztof Pietrzak (CWI - Amsterdam, NL) [dblp]
  • Bart Preneel (KU Leuven, BE) [dblp]
  • Tal Rabin (IBM TJ Watson Research Center - Hawthorne, US) [dblp]
  • Phillip Rogaway (University of California - Davis, US) [dblp]
  • Kazue Sako (NEC - Kawasaki, JP) [dblp]
  • Christian Schaffner (CWI - Amsterdam, NL) [dblp]
  • Claus Peter Schnorr (Goethe-Universität - Frankfurt a. M., DE) [dblp]
  • Adi Shamir (Weizmann Institute - Rehovot, IL) [dblp]
  • Tsuyoshi Takagi (Future University - Hakodate, JP) [dblp]
  • Salil Vadhan (Harvard University - Cambridge, US) [dblp]
  • Serge Vaudenay (EPFL - Lausanne, CH) [dblp]
  • Douglas Wikström (KTH Royal Institute of Technology, SE)
  • Stefan Wolf (ETH Zürich, CH)

Related Seminars
  • Dagstuhl Seminar 9339: Cryptography (1993-09-27 - 1993-10-01) (Details)
  • Dagstuhl Seminar 9739: Cryptography (1997-09-22 - 1997-09-26) (Details)
  • Dagstuhl Seminar 02391: Cryptography (2002-09-22 - 2002-09-27) (Details)
  • Dagstuhl Seminar 11391: Public-Key Cryptography (2011-09-25 - 2011-09-30) (Details)
  • Dagstuhl Seminar 16371: Public-Key Cryptography (2016-09-11 - 2016-09-16) (Details)

  • security / cryptography

  • cryptography
  • provable security
  • mathematical foundations
  • protocols