1 Search Results for "Yasuda, Kan"


Document
Symmetric Cryptography (Dagstuhl Seminar 20041)

Authors: Nils Gregor Leander, Bart Mennink, Kaisa Nyberg, and Kan Yasuda

Published in: Dagstuhl Reports, Volume 10, Issue 1 (2020)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 20041 "Symmetric Cryptography". The seminar was held on January 19-24, 2020 in Schloss Dagstuhl - Leibniz Center for Informatics. This was the seventh seminar in the series "Symmetric Cryptography". Previous editions were held in 2007, 2009, 2012, 2014, 2016, and 2018. Participants of the seminar presented their ongoing work and new results on topics of (quantum) cryptanalysis and provable security of symmetric cryptographic primitives. In this report, a brief summary of the seminar is given followed by the abstracts of given talks.

Cite as

Nils Gregor Leander, Bart Mennink, Kaisa Nyberg, and Kan Yasuda. Symmetric Cryptography (Dagstuhl Seminar 20041). In Dagstuhl Reports, Volume 10, Issue 1, pp. 130-143, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2020)


Copy BibTex To Clipboard

@Article{leander_et_al:DagRep.10.1.130,
  author =	{Leander, Nils Gregor and Mennink, Bart and Nyberg, Kaisa and Yasuda, Kan},
  title =	{{Symmetric Cryptography (Dagstuhl Seminar 20041)}},
  pages =	{130--143},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2020},
  volume =	{10},
  number =	{1},
  editor =	{Leander, Nils Gregor and Mennink, Bart and Nyberg, Kaisa and Yasuda, Kan},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.10.1.130},
  URN =		{urn:nbn:de:0030-drops-124023},
  doi =		{10.4230/DagRep.10.1.130},
  annote =	{Keywords: (quantum) cryptanalysis, constrained platforms, symmetric cryptography}
}
  • Refine by Author
  • 1 Leander, Nils Gregor
  • 1 Mennink, Bart
  • 1 Nyberg, Kaisa
  • 1 Yasuda, Kan

  • Refine by Classification
  • 1 Security and privacy → Cryptanalysis and other attacks
  • 1 Security and privacy → Symmetric cryptography and hash functions

  • Refine by Keyword
  • 1 (quantum) cryptanalysis
  • 1 constrained platforms
  • 1 symmetric cryptography

  • Refine by Type
  • 1 document

  • Refine by Publication Year
  • 1 2020

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail