HTML Export for Dagstuhl Seminar Proceedings, Volume 9031

Copy to Clipboard Download

<h2>Dagstuhl Seminar Proceedings, Volume 9031, </h2>
<ul>
<li>
    <span class="authors">Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway</span>
    <span class="title">09031 Abstracts Collection – Symmetric Cryptography</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.1">10.4230/DagSemProc.09031.1</a>
</li>
<li>
    <span class="authors">Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway</span>
    <span class="title">09031 Executive Summary – Symmetric Cryptography</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.2">10.4230/DagSemProc.09031.2</a>
</li>
<li>
    <span class="authors">Matthias Krause and Dirk Stegemann</span>
    <span class="title">Algebraic Attacks against Linear RFID Authentication Protocols</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.3">10.4230/DagSemProc.09031.3</a>
</li>
<li>
    <span class="authors">Erik Zenner</span>
    <span class="title">Cache Timing Analysis of eStream Finalists</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.4">10.4230/DagSemProc.09031.4</a>
</li>
<li>
    <span class="authors">Ewan Fleischmann, Christian Forler, and Michael Gorski</span>
    <span class="title">Classification of the SHA-3 Candidates</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.5">10.4230/DagSemProc.09031.5</a>
</li>
<li>
    <span class="authors">Jean-Philippe Aumasson, Itai Dinur, Willi Meier, and Adi Shamir</span>
    <span class="title">Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.6">10.4230/DagSemProc.09031.6</a>
</li>
<li>
    <span class="authors">Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen</span>
    <span class="title">Grøstl - a SHA-3 candidate</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.7">10.4230/DagSemProc.09031.7</a>
</li>
<li>
    <span class="authors">Anne Canteaut and Maria Naya-Plasencia</span>
    <span class="title">Internal collision attack on Maraca</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.8">10.4230/DagSemProc.09031.8</a>
</li>
<li>
    <span class="authors">Jorge Nakahara and Daniel Santana de Freitas</span>
    <span class="title">Mini-ciphers: a reliable testbed for cryptanalysis?</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.9">10.4230/DagSemProc.09031.9</a>
</li>
<li>
    <span class="authors">Johannes A. Buchmann, Jintai Ding, Mohamed Saied Emam Mohamed, and Wael Said Abd Elmageed Mohamed</span>
    <span class="title">MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.10">10.4230/DagSemProc.09031.10</a>
</li>
<li>
    <span class="authors">Andrea Röck and Cédric Lauradoux</span>
    <span class="title">Parallel Generation of l-Sequences</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.11">10.4230/DagSemProc.09031.11</a>
</li>
<li>
    <span class="authors">Sebastiaan Indesteege and Bart Preneel</span>
    <span class="title">Practical Collisions for EnRUPT</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.12">10.4230/DagSemProc.09031.12</a>
</li>
<li>
    <span class="authors">Sebastiaan Indesteege and Bart Preneel</span>
    <span class="title">Practical Preimages for Maraca</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.13">10.4230/DagSemProc.09031.13</a>
</li>
<li>
    <span class="authors">Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg</span>
    <span class="title">Statistical Tests for Key Recovery Using Multidimensional   Extension of Matsui&#039;s Algorithm 1</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.14">10.4230/DagSemProc.09031.14</a>
</li>
<li>
    <span class="authors">Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche</span>
    <span class="title">Sufficient conditions for sound tree hashing modes</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.15">10.4230/DagSemProc.09031.15</a>
</li>
<li>
    <span class="authors">Sebastiaan Indesteege, Elena Andreeva, Christophe De Cannière, Orr Dunkelman, Emilia Käsper, Svetla Nikova, Bart Preneel, and Elmar Tischhauser</span>
    <span class="title">The Lane hash function</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.16">10.4230/DagSemProc.09031.16</a>
</li>
<li>
    <span class="authors">Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche</span>
    <span class="title">The Road from Panama to Keccak via RadioGatún</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.17">10.4230/DagSemProc.09031.17</a>
</li>
<li>
    <span class="authors">Orr Dunkelman and Eli Biham</span>
    <span class="title">The SHAvite-3 - A New Hash Function</span>
    <a class="doi" href="https://doi.org/10.4230/DagSemProc.09031.18">10.4230/DagSemProc.09031.18</a>
</li>
</ul>

The metadata provided by Dagstuhl Publishing on its webpages, as well as their export formats (such as XML or BibTeX) available at our website, is released under the CC0 1.0 Public Domain Dedication license. That is, you are free to copy, distribute, use, modify, transform, build upon, and produce derived works from our data, even for commercial purposes, all without asking permission. Of course, we are always happy if you provide a link to us as the source of the data.

Read the full CC0 1.0 legal code for the exact terms that apply: https://creativecommons.org/publicdomain/zero/1.0/legalcode

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail