License
When quoting this document, please refer to the following
URN: urn:nbn:de:0030-drops-12928
URL: http://drops.dagstuhl.de/opus/volltexte/2008/1292/
Go to the corresponding Portal


Blömer, Johannes ; Boneh, Dan ; Cramer, Ronald ; Maurer, Ueli

07381 Executive Summary - Cryptography

pdf-format:
Document 1.pdf (107 KB)


Abstract

The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols, etc.) and in terms of the mathematical methods and techniques used (algebra, number theory, elliptic curves, probability theory, information theory, combinatorics, quantum theory, etc.). The range of applications addressed in the various talks was broad, ranging from secure communication, key management, authentication, digital signatures and payment systems to e-voting and Internet security. While the initial plan had been to focus more exclusively on public-key cryptography, it turned out that this sub-topic branches out into many other areas of cryptography and therefore the organizers decided to expand the scope, emphasizing quality rather than close adherence to public-key cryptography. This decision turned out to be a wise one. What was common to almost all the talks is that rigorous mathematical proofs for the security of the presented schemes were given. In fact, a central topic of many of the talks were proof methodologies for various contexts.

BibTeX - Entry

@InProceedings{blmer_et_al:DSP:2008:1292,
  author =	{Johannes Bl{\"o}mer and Dan Boneh and Ronald Cramer and Ueli Maurer},
  title =	{07381 Executive Summary - Cryptography},
  booktitle =	{Cryptography},
  year =	{2008},
  editor =	{Johannes Bl{\"o}mer and Dan Boneh and Ronald Cramer and Ueli Maurer},
  number =	{07381},
  series =	{Dagstuhl Seminar Proceedings},
  ISSN =	{1862-4405},
  publisher =	{Internationales Begegnungs- und Forschungszentrum f{\"u}r Informatik (IBFI), Schloss Dagstuhl, Germany},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2008/1292},
  annote =	{Keywords: Cryptography, information security, public-key cryptography, cryptographic protocols, security proofs}
}

Keywords: Cryptography, information security, public-key cryptography, cryptographic protocols, security proofs
Seminar: 07381 - Cryptography
Issue Date: 2008
Date of publication: 08.01.2008


DROPS-Home | Fulltext Search | Imprint Published by LZI