eng
Schloss Dagstuhl – Leibniz-Zentrum für Informatik
Dagstuhl Seminar Proceedings
1862-4405
2008-01-08
7381
1
19
10.4230/DagSemProc.07381.1
article
07381 Abstracts Collection – Cryptography
Blömer, Johannes
Boneh, Dan
Cramer, Ronald
Maurer, Ueli
From 16.09.2007 to 21.09.2007 the Dagstuhl Seminar 07381 ``Cryptography'' was held
in the International Conference and Research Center (IBFI), Schloss Dagstuhl.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available.
https://drops.dagstuhl.de/storage/16dagstuhl-seminar-proceedings/dsp-vol07381/DagSemProc.07381.1/DagSemProc.07381.1.pdf
Cryptography
information security
public-key cryptography
cryptographic protocols
security proofs
eng
Schloss Dagstuhl – Leibniz-Zentrum für Informatik
Dagstuhl Seminar Proceedings
1862-4405
2008-01-08
7381
1
2
10.4230/DagSemProc.07381.2
article
07381 Executive Summary - Cryptography
Blömer, Johannes
Boneh, Dan
Cramer, Ronald
Maurer, Ueli
The topics covered in the seminar spanned most areas of cryptography,
in one way or another, both in terms of the types of schemes
(public-key cryptography, symmetric cryptography, hash functions and
other cryptographic functions, multi-party protocols, etc.) and in terms of the
mathematical methods and techniques used (algebra, number theory,
elliptic curves, probability theory, information theory,
combinatorics, quantum theory, etc.). The range of applications
addressed in the various talks was broad, ranging from secure
communication, key management, authentication, digital signatures and
payment systems to e-voting and Internet security.
While the initial plan had been to focus more exclusively on public-key
cryptography, it turned out that this sub-topic branches out into
many other areas of cryptography and therefore the organizers
decided to expand the scope, emphasizing quality rather than
close adherence to public-key cryptography. This decision turned
out to be a wise one.
What was common to almost all the talks is that rigorous mathematical
proofs for the security of the presented schemes were given. In fact,
a central topic of many of the talks were proof methodologies for
various contexts.
https://drops.dagstuhl.de/storage/16dagstuhl-seminar-proceedings/dsp-vol07381/DagSemProc.07381.2/DagSemProc.07381.2.pdf
Cryptography
information security
public-key cryptography
cryptographic protocols
security proofs