Published in: Dagstuhl Reports, Volume 6, Issue 1 (2016)
George Danezis, Stefan Katzenbeisser, Christiane Peters, and Bart Preneel. Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032). In Dagstuhl Reports, Volume 6, Issue 1, pp. 99-107, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2016)
@Article{danezis_et_al:DagRep.6.1.99, author = {Danezis, George and Katzenbeisser, Stefan and Peters, Christiane and Preneel, Bart}, title = {{Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032)}}, pages = {99--107}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2016}, volume = {6}, number = {1}, editor = {Danezis, George and Katzenbeisser, Stefan and Peters, Christiane and Preneel, Bart}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.6.1.99}, URN = {urn:nbn:de:0030-drops-58160}, doi = {10.4230/DagRep.6.1.99}, annote = {Keywords: Critical infrastructure protection, smart energy grids} }
Published in: Dagstuhl Reports, Volume 6, Issue 1 (2016)
Frederik Armknecht, Tetsu Iwata, Kaisa Nyberg, and Bart Preneel. Symmetric Cryptography (Dagstuhl Seminar 16021). In Dagstuhl Reports, Volume 6, Issue 1, pp. 34-54, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2016)
@Article{armknecht_et_al:DagRep.6.1.34, author = {Armknecht, Frederik and Iwata, Tetsu and Nyberg, Kaisa and Preneel, Bart}, title = {{Symmetric Cryptography (Dagstuhl Seminar 16021)}}, pages = {34--54}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2016}, volume = {6}, number = {1}, editor = {Armknecht, Frederik and Iwata, Tetsu and Nyberg, Kaisa and Preneel, Bart}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.6.1.34}, URN = {urn:nbn:de:0030-drops-58088}, doi = {10.4230/DagRep.6.1.34}, annote = {Keywords: authenticity, block ciphers, confidentiality, cryptanalysis, hash functions, integrity, lightweight cryptography, provable security, stream ciphers} }
Published in: Dagstuhl Manifestos, Volume 5, Issue 1 (2015)
Bart Preneel, Philipp Rogaway, Mark D. Ryan, and Peter Y. A. Ryan. Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). In Dagstuhl Manifestos, Volume 5, Issue 1, pp. 25-37, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2015)
@Article{preneel_et_al:DagMan.5.1.25, author = {Preneel, Bart and Rogaway, Philipp and Ryan, Mark D. and Ryan, Peter Y. A.}, title = {{Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}}, pages = {25--37}, journal = {Dagstuhl Manifestos}, ISSN = {2193-2433}, year = {2015}, volume = {5}, number = {1}, editor = {Preneel, Bart and Rogaway, Philipp and Ryan, Mark D. and Ryan, Peter Y. A.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagMan.5.1.25}, URN = {urn:nbn:de:0030-drops-55653}, doi = {10.4230/DagMan.5.1.25}, annote = {Keywords: Big data, encryption, mass surveillance, privacy} }
Published in: Dagstuhl Reports, Volume 4, Issue 9 (2015)
Bart Preneel, Phillip Rogaway, Mark D. Ryan, and Peter Y. A. Ryan. Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). In Dagstuhl Reports, Volume 4, Issue 9, pp. 106-123, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2015)
@Article{preneel_et_al:DagRep.4.9.106, author = {Preneel, Bart and Rogaway, Phillip and Ryan, Mark D. and Ryan, Peter Y. A.}, title = {{Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}}, pages = {106--123}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2015}, volume = {4}, number = {9}, editor = {Preneel, Bart and Rogaway, Phillip and Ryan, Mark D. and Ryan, Peter Y. A.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.9.106}, URN = {urn:nbn:de:0030-drops-48882}, doi = {10.4230/DagRep.4.9.106}, annote = {Keywords: Big data, encryption, mass surveillance, privacy} }
Published in: Dagstuhl Reports, Volume 4, Issue 1 (2014)
Frederik Armknecht, Helena Handschuh, Tetsu Iwata, and Bart Preneel. Symmetric Cryptography (Dagstuhl Seminar 14021). In Dagstuhl Reports, Volume 4, Issue 1, pp. 1-16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{armknecht_et_al:DagRep.4.1.1, author = {Armknecht, Frederik and Handschuh, Helena and Iwata, Tetsu and Preneel, Bart}, title = {{Symmetric Cryptography (Dagstuhl Seminar 14021)}}, pages = {1--16}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2014}, volume = {4}, number = {1}, editor = {Armknecht, Frederik and Handschuh, Helena and Iwata, Tetsu and Preneel, Bart}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.1.1}, URN = {urn:nbn:de:0030-drops-45150}, doi = {10.4230/DagRep.4.1.1}, annote = {Keywords: Authenticity, Integrity, Privacy,Hash Functions, Block Ciphers, Provable Security, Cryptanalysis} }
Published in: Dagstuhl Reports, Volume 2, Issue 1 (2012)
Frederik Armknecht, Stefan Lucks, Bart Preneel, and Phillip Rogaway. Symmetric Cryptography (Dagstuhl Seminar 12031). In Dagstuhl Reports, Volume 2, Issue 1, pp. 39-49, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{armknecht_et_al:DagRep.2.1.39, author = {Armknecht, Frederik and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{Symmetric Cryptography (Dagstuhl Seminar 12031)}}, pages = {39--49}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {Armknecht, Frederik and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.39}, URN = {urn:nbn:de:0030-drops-34569}, doi = {10.4230/DagRep.2.1.39}, annote = {Keywords: Hash functions, Feistel networks, BLAKE, KLEIN, Keccak, IDEA, GCM, EAXprime, TLS, KISS} }
Published in: Dagstuhl Reports, Volume 1, Issue 12 (2012)
Stefan Katzenbeisser, Klaus Kursawe, Bart Preneel, and Ahmad-Reza Sadeghi. Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511). In Dagstuhl Reports, Volume 1, Issue 12, pp. 62-68, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{katzenbeisser_et_al:DagRep.1.12.62, author = {Katzenbeisser, Stefan and Kursawe, Klaus and Preneel, Bart and Sadeghi, Ahmad-Reza}, title = {{Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511)}}, pages = {62--68}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {1}, number = {12}, editor = {Katzenbeisser, Stefan and Kursawe, Klaus and Preneel, Bart and Sadeghi, Ahmad-Reza}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12.62}, URN = {urn:nbn:de:0030-drops-34518}, doi = {10.4230/DagRep.1.12.62}, annote = {Keywords: privacy, security, smart grid, digital metrology} }
Published in: Dagstuhl Seminar Proceedings, Volume 9282, Foundations for Forgery-Resilient Cryptographic Hardware (2010)
Jorge Guajardo, Bart Preneel, Pim Tuyls, and Ahmad-Reza Sadeghi. 09282 Abstracts Collection – Foundations for Forgery-Resilient Cryptographic Hardware. In Foundations for Forgery-Resilient Cryptographic Hardware. Dagstuhl Seminar Proceedings, Volume 9282, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{guajardo_et_al:DagSemProc.09282.1, author = {Guajardo, Jorge and Preneel, Bart and Tuyls, Pim and Sadeghi, Ahmad-Reza}, title = {{09282 Abstracts Collection – Foundations for Forgery-Resilient Cryptographic Hardware}}, booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2010}, volume = {9282}, editor = {Jorge Guajardo and Bart Preneel and Ahmad-Reza Sadeghi and Pim Tuyls}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09282.1}, URN = {urn:nbn:de:0030-drops-24073}, doi = {10.4230/DagSemProc.09282.1}, annote = {Keywords: Foundations, PUF models, PUF applications, anti-counterfeiting, forgery resilience, side-channel attack models} }
Published in: Dagstuhl Seminar Proceedings, Volume 9282, Foundations for Forgery-Resilient Cryptographic Hardware (2010)
Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, and Pim Tuyls. 09282 Executive Summary – Foundations for Forgery-Resilient Cryptographic Hardware. In Foundations for Forgery-Resilient Cryptographic Hardware. Dagstuhl Seminar Proceedings, Volume 9282, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{guajardo_et_al:DagSemProc.09282.2, author = {Guajardo, Jorge and Preneel, Bart and Sadeghi, Ahmad-Reza and Tuyls, Pim}, title = {{09282 Executive Summary – Foundations for Forgery-Resilient Cryptographic Hardware}}, booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware}, pages = {1--7}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2010}, volume = {9282}, editor = {Jorge Guajardo and Bart Preneel and Ahmad-Reza Sadeghi and Pim Tuyls}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09282.2}, URN = {urn:nbn:de:0030-drops-24086}, doi = {10.4230/DagSemProc.09282.2}, annote = {Keywords: Foundations, PUF models, PUF applications, anti-counterfeiting,forgery resilience, side-channel attack models} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway. 09031 Abstracts Collection – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{handschuh_et_al:DagSemProc.09031.1, author = {Handschuh, Helena and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{09031 Abstracts Collection – Symmetric Cryptography }}, booktitle = {Symmetric Cryptography}, pages = {1--17}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.1}, URN = {urn:nbn:de:0030-drops-19603}, doi = {10.4230/DagSemProc.09031.1}, annote = {Keywords: Symmetric cryptography, symmetric primitives and cryptoschemes, hash functions, block ciphers, stream ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway. 09031 Executive Summary – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{handschuh_et_al:DagSemProc.09031.2, author = {Handschuh, Helena and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{09031 Executive Summary – Symmetric Cryptography}}, booktitle = {Symmetric Cryptography}, pages = {1--3}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.2}, URN = {urn:nbn:de:0030-drops-19590}, doi = {10.4230/DagSemProc.09031.2}, annote = {Keywords: Symmetric cryptography, symmetric primitives and cryptoschemes, hash functions, block ciphers, stream ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Sebastiaan Indesteege and Bart Preneel. Practical Collisions for EnRUPT. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.12, author = {Indesteege, Sebastiaan and Preneel, Bart}, title = {{Practical Collisions for EnRUPT}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.12}, URN = {urn:nbn:de:0030-drops-19509}, doi = {10.4230/DagSemProc.09031.12}, annote = {Keywords: EnRUPT, SHA-3 candidate, hash function, collision attack} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Sebastiaan Indesteege and Bart Preneel. Practical Preimages for Maraca. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.13, author = {Indesteege, Sebastiaan and Preneel, Bart}, title = {{Practical Preimages for Maraca}}, booktitle = {Symmetric Cryptography}, pages = {1--2}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.13}, URN = {urn:nbn:de:0030-drops-19512}, doi = {10.4230/DagSemProc.09031.13}, annote = {Keywords: Maraca, hash function, preimage attack} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Sebastiaan Indesteege, Elena Andreeva, Christophe De Cannière, Orr Dunkelman, Emilia Käsper, Svetla Nikova, Bart Preneel, and Elmar Tischhauser. The Lane hash function. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.16, author = {Indesteege, Sebastiaan and Andreeva, Elena and De Canni\`{e}re, Christophe and Dunkelman, Orr and K\"{a}sper, Emilia and Nikova, Svetla and Preneel, Bart and Tischhauser, Elmar}, title = {{The Lane hash function}}, booktitle = {Symmetric Cryptography}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.16}, URN = {urn:nbn:de:0030-drops-19523}, doi = {10.4230/DagSemProc.09031.16}, annote = {Keywords: Lane, SHA-3 candidate, hash function} }
Feedback for Dagstuhl Publishing