@InProceedings{biham_et_al:DagSemProc.07021.1, author = {Biham, Eli and Handschuh, Helena and Lucks, Stefan and Rijmen, Vincent}, title = {{07021 Abstracts Collection – Symmetric Cryptography}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.1}, URN = {urn:nbn:de:0030-drops-10373}, doi = {10.4230/DagSemProc.07021.1}, annote = {Keywords: Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Provable Security, Cryptanalysis} } @InProceedings{biham_et_al:DagSemProc.07021.2, author = {Biham, Eli and Handschuh, Helena and Lucks, Stefan and Rijmen, Vincent}, title = {{07021 Executive Summary – Symmetric Cryptography}}, booktitle = {Symmetric Cryptography}, pages = {1--3}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.2}, URN = {urn:nbn:de:0030-drops-10204}, doi = {10.4230/DagSemProc.07021.2}, annote = {Keywords: Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Provable Security, Cryptanalysis} } @InProceedings{lucks:DagSemProc.07021.3, author = {Lucks, Stefan}, title = {{A Collision-Resistant Rate-1 Double-Block-Length Hash Function}}, booktitle = {Symmetric Cryptography}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.3}, URN = {urn:nbn:de:0030-drops-10172}, doi = {10.4230/DagSemProc.07021.3}, annote = {Keywords: Hash function, provable security, double-block-length} } @InProceedings{nyberg_et_al:DagSemProc.07021.4, author = {Nyberg, Kaisa and Hakala, Risto}, title = {{A Key-Recovery Attack on SOBER-128}}, booktitle = {Symmetric Cryptography}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.4}, URN = {urn:nbn:de:0030-drops-10188}, doi = {10.4230/DagSemProc.07021.4}, annote = {Keywords: Linear approximations, correlation, linear cryptanalysis, key recovery attack, piling-up lemma, SOBER-128} } @InProceedings{biryukov:DagSemProc.07021.5, author = {Biryukov, Alex}, title = {{Block and Stream Ciphers and the Creatures in Between}}, booktitle = {Symmetric Cryptography}, pages = {1--9}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.5}, URN = {urn:nbn:de:0030-drops-10387}, doi = {10.4230/DagSemProc.07021.5}, annote = {Keywords: Stream ciphers, block ciphers} } @InProceedings{dichtl:DagSemProc.07021.6, author = {Dichtl, Markus}, title = {{Cryptographic Shuffling of Random and Pseudorandom Sequences}}, booktitle = {Symmetric Cryptography}, pages = {1--4}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.6}, URN = {urn:nbn:de:0030-drops-10141}, doi = {10.4230/DagSemProc.07021.6}, annote = {Keywords: Shuffling stream-cipher} } @InProceedings{rose_et_al:DagSemProc.07021.7, author = {Rose, Gregory G. and Hawkes, Philip and Paddon, Michael and McDonald, Cameron and Wiggers de Vries, Miriam}, title = {{Design and Primitive Specification for Shannon}}, booktitle = {Symmetric Cryptography}, pages = {1--19}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.7}, URN = {urn:nbn:de:0030-drops-10198}, doi = {10.4230/DagSemProc.07021.7}, annote = {Keywords: Stream cipher} } @InProceedings{courtois:DagSemProc.07021.8, author = {Courtois, Nicolas T.}, title = {{How Fast can be Algebraic Attacks on Block Ciphers?}}, booktitle = {Symmetric Cryptography}, pages = {1--6}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.8}, URN = {urn:nbn:de:0030-drops-10130}, doi = {10.4230/DagSemProc.07021.8}, annote = {Keywords: Algebraic Attacks On Block Ciphers, XSL attacks, AES, DES, SAT Solvers, T' method, Gr\~{A}ƒ\^{A}¶bner bases} } @InProceedings{arditti_et_al:DagSemProc.07021.9, author = {Arditti, David and Berbain, C\^{o}me and Billet, Olivier and Gilbert, Henri and Patarin, Jacques}, title = {{QUAD: Overview and Recent Developments}}, booktitle = {Symmetric Cryptography}, pages = {1--20}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.9}, URN = {urn:nbn:de:0030-drops-10155}, doi = {10.4230/DagSemProc.07021.9}, annote = {Keywords: MQ problem, stream cipher, provable security, Gr\~{A}ƒ\^{A}¶bner basis} } @InProceedings{iwata:DagSemProc.07021.10, author = {Iwata, Tetsu}, title = {{Tightness of the Security Bound of CENC}}, booktitle = {Symmetric Cryptography}, pages = {1--6}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.10}, URN = {urn:nbn:de:0030-drops-10169}, doi = {10.4230/DagSemProc.07021.10}, annote = {Keywords: Encryption mode, blockcipher, CENC, provable security} } @InProceedings{zenner:DagSemProc.07021.11, author = {Zenner, Erik}, title = {{Why IV Setup for Stream Ciphers is Difficult}}, booktitle = {Symmetric Cryptography}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.11}, URN = {urn:nbn:de:0030-drops-10126}, doi = {10.4230/DagSemProc.07021.11}, annote = {Keywords: Stream cipher, IV setup} }