Published in: Dagstuhl Reports, Volume 8, Issue 1 (2018)
Joan Daemen, Tetsu Iwata, Nils Gregor Leander, and Kaisa Nyberg. Symmetric Cryptography (Dagstuhl Seminar 18021). In Dagstuhl Reports, Volume 8, Issue 1, pp. 1-32, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2018)
@Article{daemen_et_al:DagRep.8.1.1, author = {Daemen, Joan and Iwata, Tetsu and Leander, Nils Gregor and Nyberg, Kaisa}, title = {{Symmetric Cryptography (Dagstuhl Seminar 18021)}}, pages = {1--32}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2018}, volume = {8}, number = {1}, editor = {Daemen, Joan and Iwata, Tetsu and Leander, Nils Gregor and Nyberg, Kaisa}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.8.1.1}, URN = {urn:nbn:de:0030-drops-92832}, doi = {10.4230/DagRep.8.1.1}, annote = {Keywords: symmetric cryptography, cryptanalysis, authenticated encryption, cryptography for IoT, mass surveillance} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. Sufficient conditions for sound tree hashing modes. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, p. 1, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{bertoni_et_al:DagSemProc.09031.15, author = {Bertoni, Guido and Daemen, Joan and Peeters, Micha\"{e}l and Van Assche, Gilles}, title = {{Sufficient conditions for sound tree hashing modes}}, booktitle = {Symmetric Cryptography}, pages = {1--1}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.15}, URN = {urn:nbn:de:0030-drops-19463}, doi = {10.4230/DagSemProc.09031.15}, annote = {Keywords: Tree Hashing, Indifferentiability} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. The Road from Panama to Keccak via RadioGatún. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{bertoni_et_al:DagSemProc.09031.17, author = {Bertoni, Guido and Daemen, Joan and Peeters, Micha\"{e}l and Van Assche, Gilles}, title = {{The Road from Panama to Keccak via RadioGat\'{u}n}}, booktitle = {Symmetric Cryptography}, pages = {1--9}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.17}, URN = {urn:nbn:de:0030-drops-19587}, doi = {10.4230/DagSemProc.09031.17}, annote = {Keywords: Hash function, cryptography} }
Feedback for Dagstuhl Publishing