Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway. 09031 Abstracts Collection – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{handschuh_et_al:DagSemProc.09031.1, author = {Handschuh, Helena and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{09031 Abstracts Collection – Symmetric Cryptography }}, booktitle = {Symmetric Cryptography}, pages = {1--17}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.1}, URN = {urn:nbn:de:0030-drops-19603}, doi = {10.4230/DagSemProc.09031.1}, annote = {Keywords: Symmetric cryptography, symmetric primitives and cryptoschemes, hash functions, block ciphers, stream ciphers} }
Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway. 09031 Executive Summary – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{handschuh_et_al:DagSemProc.09031.2, author = {Handschuh, Helena and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{09031 Executive Summary – Symmetric Cryptography}}, booktitle = {Symmetric Cryptography}, pages = {1--3}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.2}, URN = {urn:nbn:de:0030-drops-19590}, doi = {10.4230/DagSemProc.09031.2}, annote = {Keywords: Symmetric cryptography, symmetric primitives and cryptoschemes, hash functions, block ciphers, stream ciphers} }
Matthias Krause and Dirk Stegemann. Algebraic Attacks against Linear RFID Authentication Protocols. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{krause_et_al:DagSemProc.09031.3, author = {Krause, Matthias and Stegemann, Dirk}, title = {{Algebraic Attacks against Linear RFID Authentication Protocols}}, booktitle = {Symmetric Cryptography}, pages = {1--18}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.3}, URN = {urn:nbn:de:0030-drops-19576}, doi = {10.4230/DagSemProc.09031.3}, annote = {Keywords: RFID Authentication, HB+, CKK, CKK2} }
Erik Zenner. Cache Timing Analysis of eStream Finalists. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-8, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{zenner:DagSemProc.09031.4, author = {Zenner, Erik}, title = {{Cache Timing Analysis of eStream Finalists}}, booktitle = {Symmetric Cryptography}, pages = {1--8}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.4}, URN = {urn:nbn:de:0030-drops-19437}, doi = {10.4230/DagSemProc.09031.4}, annote = {Keywords: Cache timing attacks, stream ciphers} }
Ewan Fleischmann, Christian Forler, and Michael Gorski. Classification of the SHA-3 Candidates. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{fleischmann_et_al:DagSemProc.09031.5, author = {Fleischmann, Ewan and Forler, Christian and Gorski, Michael}, title = {{Classification of the SHA-3 Candidates}}, booktitle = {Symmetric Cryptography}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.5}, URN = {urn:nbn:de:0030-drops-19482}, doi = {10.4230/DagSemProc.09031.5}, annote = {Keywords: Hash function, SHA-3, classification} }
Jean-Philippe Aumasson, Itai Dinur, Willi Meier, and Adi Shamir. Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{aumasson_et_al:DagSemProc.09031.6, author = {Aumasson, Jean-Philippe and Dinur, Itai and Meier, Willi and Shamir, Adi}, title = {{Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium}}, booktitle = {Symmetric Cryptography}, pages = {1--22}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.6}, URN = {urn:nbn:de:0030-drops-19443}, doi = {10.4230/DagSemProc.09031.6}, annote = {Keywords: Cube attacks, property testing, MD6, Trivium} }
Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen. Grøstl - a SHA-3 candidate. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-33, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{gauravaram_et_al:DagSemProc.09031.7, author = {Gauravaram, Praveen and Knudsen, Lars R. and Matusiewicz, Krystian and Mendel, Florian and Rechberger, Christian and Schl\"{a}ffer, Martin and Thomsen, S{\o}ren S.}, title = {{Gr{\o}stl - a SHA-3 candidate}}, booktitle = {Symmetric Cryptography}, pages = {1--33}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.7}, URN = {urn:nbn:de:0030-drops-19554}, doi = {10.4230/DagSemProc.09031.7}, annote = {Keywords: SHA-3 proposal, hash function} }
Anne Canteaut and Maria Naya-Plasencia. Internal collision attack on Maraca. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{canteaut_et_al:DagSemProc.09031.8, author = {Canteaut, Anne and Naya-Plasencia, Maria}, title = {{Internal collision attack on Maraca}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.8}, URN = {urn:nbn:de:0030-drops-19538}, doi = {10.4230/DagSemProc.09031.8}, annote = {Keywords: Hash function, collision attack, differential cryptanalysis, Boolean function} }
Jorge Nakahara and Daniel Santana de Freitas. Mini-ciphers: a reliable testbed for cryptanalysis?. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{nakahara_et_al:DagSemProc.09031.9, author = {Nakahara, Jorge and Santana de Freitas, Daniel}, title = {{Mini-ciphers: a reliable testbed for cryptanalysis?}}, booktitle = {Symmetric Cryptography}, pages = {1--13}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.9}, URN = {urn:nbn:de:0030-drops-19614}, doi = {10.4230/DagSemProc.09031.9}, annote = {Keywords: Mini-ciphers, higher-order square attacks} }
Johannes A. Buchmann, Jintai Ding, Mohamed Saied Emam Mohamed, and Wael Said Abd Elmageed Mohamed. MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{buchmann_et_al:DagSemProc.09031.10, author = {Buchmann, Johannes A. and Ding, Jintai and Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed}, title = {{MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis}}, booktitle = {Symmetric Cryptography}, pages = {1--7}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.10}, URN = {urn:nbn:de:0030-drops-19456}, doi = {10.4230/DagSemProc.09031.10}, annote = {Keywords: Multivariate systems, MutantXL} }
Andrea Röck and Cédric Lauradoux. Parallel Generation of l-Sequences. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{rock_et_al:DagSemProc.09031.11, author = {R\"{o}ck, Andrea and Lauradoux, C\'{e}dric}, title = {{Parallel Generation of l-Sequences}}, booktitle = {Symmetric Cryptography}, pages = {1--6}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.11}, URN = {urn:nbn:de:0030-drops-19569}, doi = {10.4230/DagSemProc.09031.11}, annote = {Keywords: Sequences, synthesis, decimation, parallelism, LFSRs, FCSRs} }
Sebastiaan Indesteege and Bart Preneel. Practical Collisions for EnRUPT. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.12, author = {Indesteege, Sebastiaan and Preneel, Bart}, title = {{Practical Collisions for EnRUPT}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.12}, URN = {urn:nbn:de:0030-drops-19509}, doi = {10.4230/DagSemProc.09031.12}, annote = {Keywords: EnRUPT, SHA-3 candidate, hash function, collision attack} }
Sebastiaan Indesteege and Bart Preneel. Practical Preimages for Maraca. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.13, author = {Indesteege, Sebastiaan and Preneel, Bart}, title = {{Practical Preimages for Maraca}}, booktitle = {Symmetric Cryptography}, pages = {1--2}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.13}, URN = {urn:nbn:de:0030-drops-19512}, doi = {10.4230/DagSemProc.09031.13}, annote = {Keywords: Maraca, hash function, preimage attack} }
Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{hermelin_et_al:DagSemProc.09031.14, author = {Hermelin, Miia and Cho, Joo Yeon and Nyberg, Kaisa}, title = {{Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1}}, booktitle = {Symmetric Cryptography}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.14}, URN = {urn:nbn:de:0030-drops-19541}, doi = {10.4230/DagSemProc.09031.14}, annote = {Keywords: Block cipher, key recovery attacks, key ranking, linear cryptanalysis, multidimensional approximation} }
Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. Sufficient conditions for sound tree hashing modes. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, p. 1, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{bertoni_et_al:DagSemProc.09031.15, author = {Bertoni, Guido and Daemen, Joan and Peeters, Micha\"{e}l and Van Assche, Gilles}, title = {{Sufficient conditions for sound tree hashing modes}}, booktitle = {Symmetric Cryptography}, pages = {1--1}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.15}, URN = {urn:nbn:de:0030-drops-19463}, doi = {10.4230/DagSemProc.09031.15}, annote = {Keywords: Tree Hashing, Indifferentiability} }
Sebastiaan Indesteege, Elena Andreeva, Christophe De Cannière, Orr Dunkelman, Emilia Käsper, Svetla Nikova, Bart Preneel, and Elmar Tischhauser. The Lane hash function. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.16, author = {Indesteege, Sebastiaan and Andreeva, Elena and De Canni\`{e}re, Christophe and Dunkelman, Orr and K\"{a}sper, Emilia and Nikova, Svetla and Preneel, Bart and Tischhauser, Elmar}, title = {{The Lane hash function}}, booktitle = {Symmetric Cryptography}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.16}, URN = {urn:nbn:de:0030-drops-19523}, doi = {10.4230/DagSemProc.09031.16}, annote = {Keywords: Lane, SHA-3 candidate, hash function} }
Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. The Road from Panama to Keccak via RadioGatún. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{bertoni_et_al:DagSemProc.09031.17, author = {Bertoni, Guido and Daemen, Joan and Peeters, Micha\"{e}l and Van Assche, Gilles}, title = {{The Road from Panama to Keccak via RadioGat\'{u}n}}, booktitle = {Symmetric Cryptography}, pages = {1--9}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.17}, URN = {urn:nbn:de:0030-drops-19587}, doi = {10.4230/DagSemProc.09031.17}, annote = {Keywords: Hash function, cryptography} }
Orr Dunkelman and Eli Biham. The SHAvite-3 - A New Hash Function. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-39, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{dunkelman_et_al:DagSemProc.09031.18, author = {Dunkelman, Orr and Biham, Eli}, title = {{The SHAvite-3 - A New Hash Function}}, booktitle = {Symmetric Cryptography}, pages = {1--39}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.18}, URN = {urn:nbn:de:0030-drops-19471}, doi = {10.4230/DagSemProc.09031.18}, annote = {Keywords: SHAvite-3, SHA-3, hash function} }
Feedback for Dagstuhl Publishing