Symmetric Cryptography (Dagstuhl Seminar 24041)

Authors Christof Beierle, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Rachelle Heim Boissier and all authors of the abstracts in this report



PDF
Thumbnail PDF

File

DagRep.14.1.72.pdf
  • Filesize: 3.03 MB
  • 18 pages

Document Identifiers

Author Details

Christof Beierle
  • Ruhr-Universität Bochum, DE
Bart Mennink
  • Radboud University Nijmegen, NL
María Naya-Plasencia
  • INRIA - Paris, FR
Yu Sasaki
  • NTT - Tokyo, JP
Rachelle Heim Boissier
  • UVSQ, Paris Saclay, FR
and all authors of the abstracts in this report

Cite AsGet BibTex

Christof Beierle, Bart Mennink, María Naya-Plasencia, Yu Sasaki, and Rachelle Heim Boissier. Symmetric Cryptography (Dagstuhl Seminar 24041). In Dagstuhl Reports, Volume 14, Issue 1, pp. 72-89, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/DagRep.14.1.72

Abstract

This report documents the program and the outcomes of Dagstuhl Seminar "Symmetric Cryptography" (24041). The seminar was held on January 21-26, 2024 in Schloss Dagstuhl - Leibniz Center for Informatics. This was the ninth seminar in the series "Symmetric Cryptography". Previous editions were held in 2007, 2009, 2012, 2014, 2016, 2018, 2020 and 2022. Participants of the seminar presented their ongoing work and new results on topics of cryptanalysis and (post-quantum) provable security of symmetric cryptographic primitives. Participants also worked together within seven research group dedicated to various topics (Cryptanalysis of Poseidon, Cryptanalysis of TEA-3, Exploitation of the wrong key randomization hypothesis non-conformity in key recovery attacks, Cryptanalysis of SCARF, Differential cryptanalysis and more, Key control security and Security of sponge combiners). In this report, a brief summary of the seminar is given, followed by the abstracts of given talks and a summary of the progress of each research group.

Subject Classification

ACM Subject Classification
  • Security and privacy → Cryptanalysis and other attacks
  • Security and privacy → Symmetric cryptography and hash functions
Keywords
  • Lightweight Cryptography
  • New Applications of Symmetric Cryptography
  • Permutation-Based Cryptography

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail