Published in: Dagstuhl Reports, Volume 9, Issue 11 (2020)
Frederik Armknecht, Ingrid Verbauwhede, Melanie Volkamer, and Moti Yung. Biggest Failures in Security (Dagstuhl Seminar 19451). In Dagstuhl Reports, Volume 9, Issue 11, pp. 1-23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2020)
@Article{armknecht_et_al:DagRep.9.11.1, author = {Armknecht, Frederik and Verbauwhede, Ingrid and Volkamer, Melanie and Yung, Moti}, title = {{Biggest Failures in Security (Dagstuhl Seminar 19451)}}, pages = {1--23}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2020}, volume = {9}, number = {11}, editor = {Armknecht, Frederik and Verbauwhede, Ingrid and Volkamer, Melanie and Yung, Moti}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.9.11.1}, URN = {urn:nbn:de:0030-drops-119818}, doi = {10.4230/DagRep.9.11.1}, annote = {Keywords: Cryptography, Hardware, Security engineering, Software engineering, Usability, Human Computer interaction (HCI), Human and societal aspects of security and privacy, Usable security or human factors in security, Security evaluation and certification} }
Published in: Dagstuhl Reports, Volume 6, Issue 1 (2016)
Frederik Armknecht, Tetsu Iwata, Kaisa Nyberg, and Bart Preneel. Symmetric Cryptography (Dagstuhl Seminar 16021). In Dagstuhl Reports, Volume 6, Issue 1, pp. 34-54, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2016)
@Article{armknecht_et_al:DagRep.6.1.34, author = {Armknecht, Frederik and Iwata, Tetsu and Nyberg, Kaisa and Preneel, Bart}, title = {{Symmetric Cryptography (Dagstuhl Seminar 16021)}}, pages = {34--54}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2016}, volume = {6}, number = {1}, editor = {Armknecht, Frederik and Iwata, Tetsu and Nyberg, Kaisa and Preneel, Bart}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.6.1.34}, URN = {urn:nbn:de:0030-drops-58088}, doi = {10.4230/DagRep.6.1.34}, annote = {Keywords: authenticity, block ciphers, confidentiality, cryptanalysis, hash functions, integrity, lightweight cryptography, provable security, stream ciphers} }
Published in: Dagstuhl Reports, Volume 4, Issue 1 (2014)
Frederik Armknecht, Helena Handschuh, Tetsu Iwata, and Bart Preneel. Symmetric Cryptography (Dagstuhl Seminar 14021). In Dagstuhl Reports, Volume 4, Issue 1, pp. 1-16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{armknecht_et_al:DagRep.4.1.1, author = {Armknecht, Frederik and Handschuh, Helena and Iwata, Tetsu and Preneel, Bart}, title = {{Symmetric Cryptography (Dagstuhl Seminar 14021)}}, pages = {1--16}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2014}, volume = {4}, number = {1}, editor = {Armknecht, Frederik and Handschuh, Helena and Iwata, Tetsu and Preneel, Bart}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.1.1}, URN = {urn:nbn:de:0030-drops-45150}, doi = {10.4230/DagRep.4.1.1}, annote = {Keywords: Authenticity, Integrity, Privacy,Hash Functions, Block Ciphers, Provable Security, Cryptanalysis} }
Published in: Dagstuhl Reports, Volume 2, Issue 1 (2012)
Frederik Armknecht, Stefan Lucks, Bart Preneel, and Phillip Rogaway. Symmetric Cryptography (Dagstuhl Seminar 12031). In Dagstuhl Reports, Volume 2, Issue 1, pp. 39-49, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{armknecht_et_al:DagRep.2.1.39, author = {Armknecht, Frederik and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{Symmetric Cryptography (Dagstuhl Seminar 12031)}}, pages = {39--49}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {Armknecht, Frederik and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.39}, URN = {urn:nbn:de:0030-drops-34569}, doi = {10.4230/DagRep.2.1.39}, annote = {Keywords: Hash functions, Feistel networks, BLAKE, KLEIN, Keccak, IDEA, GCM, EAXprime, TLS, KISS} }
Feedback for Dagstuhl Publishing