Published in: LIPIcs, Volume 317, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2024)
Halley Goldberg and Valentine Kabanets. Consequences of Randomized Reductions from SAT to Time-Bounded Kolmogorov Complexity. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 317, pp. 51:1-51:19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
@InProceedings{goldberg_et_al:LIPIcs.APPROX/RANDOM.2024.51, author = {Goldberg, Halley and Kabanets, Valentine}, title = {{Consequences of Randomized Reductions from SAT to Time-Bounded Kolmogorov Complexity}}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2024)}, pages = {51:1--51:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-348-5}, ISSN = {1868-8969}, year = {2024}, volume = {317}, editor = {Kumar, Amit and Ron-Zewi, Noga}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.APPROX/RANDOM.2024.51}, URN = {urn:nbn:de:0030-drops-210444}, doi = {10.4230/LIPIcs.APPROX/RANDOM.2024.51}, annote = {Keywords: Meta-complexity, Randomized reductions, NP-hardness, Worst-case complexity, Time-bounded Kolmogorov complexity} }
Published in: LIPIcs, Volume 304, 5th Conference on Information-Theoretic Cryptography (ITC 2024)
Akshima. Time-Space Tradeoffs for Finding Multi-Collisions in Merkle-Damgård Hash Functions. In 5th Conference on Information-Theoretic Cryptography (ITC 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 304, pp. 9:1-9:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
@InProceedings{akshima:LIPIcs.ITC.2024.9, author = {Akshima}, title = {{Time-Space Tradeoffs for Finding Multi-Collisions in Merkle-Damg\r{a}rd Hash Functions}}, booktitle = {5th Conference on Information-Theoretic Cryptography (ITC 2024)}, pages = {9:1--9:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-333-1}, ISSN = {1868-8969}, year = {2024}, volume = {304}, editor = {Aggarwal, Divesh}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2024.9}, URN = {urn:nbn:de:0030-drops-205171}, doi = {10.4230/LIPIcs.ITC.2024.9}, annote = {Keywords: Collision, hash functions, multi-collisions, Merkle-Damg\r{a}rd, pre-computation, auxiliary input} }
Published in: Dagstuhl Reports, Volume 4, Issue 1 (2014)
Frederik Armknecht, Helena Handschuh, Tetsu Iwata, and Bart Preneel. Symmetric Cryptography (Dagstuhl Seminar 14021). In Dagstuhl Reports, Volume 4, Issue 1, pp. 1-16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{armknecht_et_al:DagRep.4.1.1, author = {Armknecht, Frederik and Handschuh, Helena and Iwata, Tetsu and Preneel, Bart}, title = {{Symmetric Cryptography (Dagstuhl Seminar 14021)}}, pages = {1--16}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2014}, volume = {4}, number = {1}, editor = {Armknecht, Frederik and Handschuh, Helena and Iwata, Tetsu and Preneel, Bart}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.1.1}, URN = {urn:nbn:de:0030-drops-45150}, doi = {10.4230/DagRep.4.1.1}, annote = {Keywords: Authenticity, Integrity, Privacy,Hash Functions, Block Ciphers, Provable Security, Cryptanalysis} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Jorge Nakahara and Daniel Santana de Freitas. Mini-ciphers: a reliable testbed for cryptanalysis?. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{nakahara_et_al:DagSemProc.09031.9, author = {Nakahara, Jorge and Santana de Freitas, Daniel}, title = {{Mini-ciphers: a reliable testbed for cryptanalysis?}}, booktitle = {Symmetric Cryptography}, pages = {1--13}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.9}, URN = {urn:nbn:de:0030-drops-19614}, doi = {10.4230/DagSemProc.09031.9}, annote = {Keywords: Mini-ciphers, higher-order square attacks} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway. 09031 Abstracts Collection – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{handschuh_et_al:DagSemProc.09031.1, author = {Handschuh, Helena and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{09031 Abstracts Collection – Symmetric Cryptography }}, booktitle = {Symmetric Cryptography}, pages = {1--17}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.1}, URN = {urn:nbn:de:0030-drops-19603}, doi = {10.4230/DagSemProc.09031.1}, annote = {Keywords: Symmetric cryptography, symmetric primitives and cryptoschemes, hash functions, block ciphers, stream ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway. 09031 Executive Summary – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{handschuh_et_al:DagSemProc.09031.2, author = {Handschuh, Helena and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{09031 Executive Summary – Symmetric Cryptography}}, booktitle = {Symmetric Cryptography}, pages = {1--3}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.2}, URN = {urn:nbn:de:0030-drops-19590}, doi = {10.4230/DagSemProc.09031.2}, annote = {Keywords: Symmetric cryptography, symmetric primitives and cryptoschemes, hash functions, block ciphers, stream ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Matthias Krause and Dirk Stegemann. Algebraic Attacks against Linear RFID Authentication Protocols. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{krause_et_al:DagSemProc.09031.3, author = {Krause, Matthias and Stegemann, Dirk}, title = {{Algebraic Attacks against Linear RFID Authentication Protocols}}, booktitle = {Symmetric Cryptography}, pages = {1--18}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.3}, URN = {urn:nbn:de:0030-drops-19576}, doi = {10.4230/DagSemProc.09031.3}, annote = {Keywords: RFID Authentication, HB+, CKK, CKK2} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Erik Zenner. Cache Timing Analysis of eStream Finalists. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-8, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{zenner:DagSemProc.09031.4, author = {Zenner, Erik}, title = {{Cache Timing Analysis of eStream Finalists}}, booktitle = {Symmetric Cryptography}, pages = {1--8}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.4}, URN = {urn:nbn:de:0030-drops-19437}, doi = {10.4230/DagSemProc.09031.4}, annote = {Keywords: Cache timing attacks, stream ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Ewan Fleischmann, Christian Forler, and Michael Gorski. Classification of the SHA-3 Candidates. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{fleischmann_et_al:DagSemProc.09031.5, author = {Fleischmann, Ewan and Forler, Christian and Gorski, Michael}, title = {{Classification of the SHA-3 Candidates}}, booktitle = {Symmetric Cryptography}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.5}, URN = {urn:nbn:de:0030-drops-19482}, doi = {10.4230/DagSemProc.09031.5}, annote = {Keywords: Hash function, SHA-3, classification} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Jean-Philippe Aumasson, Itai Dinur, Willi Meier, and Adi Shamir. Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{aumasson_et_al:DagSemProc.09031.6, author = {Aumasson, Jean-Philippe and Dinur, Itai and Meier, Willi and Shamir, Adi}, title = {{Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium}}, booktitle = {Symmetric Cryptography}, pages = {1--22}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.6}, URN = {urn:nbn:de:0030-drops-19443}, doi = {10.4230/DagSemProc.09031.6}, annote = {Keywords: Cube attacks, property testing, MD6, Trivium} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen. Grøstl - a SHA-3 candidate. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-33, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{gauravaram_et_al:DagSemProc.09031.7, author = {Gauravaram, Praveen and Knudsen, Lars R. and Matusiewicz, Krystian and Mendel, Florian and Rechberger, Christian and Schl\"{a}ffer, Martin and Thomsen, S{\o}ren S.}, title = {{Gr{\o}stl - a SHA-3 candidate}}, booktitle = {Symmetric Cryptography}, pages = {1--33}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.7}, URN = {urn:nbn:de:0030-drops-19554}, doi = {10.4230/DagSemProc.09031.7}, annote = {Keywords: SHA-3 proposal, hash function} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Anne Canteaut and Maria Naya-Plasencia. Internal collision attack on Maraca. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{canteaut_et_al:DagSemProc.09031.8, author = {Canteaut, Anne and Naya-Plasencia, Maria}, title = {{Internal collision attack on Maraca}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.8}, URN = {urn:nbn:de:0030-drops-19538}, doi = {10.4230/DagSemProc.09031.8}, annote = {Keywords: Hash function, collision attack, differential cryptanalysis, Boolean function} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Johannes A. Buchmann, Jintai Ding, Mohamed Saied Emam Mohamed, and Wael Said Abd Elmageed Mohamed. MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{buchmann_et_al:DagSemProc.09031.10, author = {Buchmann, Johannes A. and Ding, Jintai and Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed}, title = {{MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis}}, booktitle = {Symmetric Cryptography}, pages = {1--7}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.10}, URN = {urn:nbn:de:0030-drops-19456}, doi = {10.4230/DagSemProc.09031.10}, annote = {Keywords: Multivariate systems, MutantXL} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Andrea Röck and Cédric Lauradoux. Parallel Generation of l-Sequences. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{rock_et_al:DagSemProc.09031.11, author = {R\"{o}ck, Andrea and Lauradoux, C\'{e}dric}, title = {{Parallel Generation of l-Sequences}}, booktitle = {Symmetric Cryptography}, pages = {1--6}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.11}, URN = {urn:nbn:de:0030-drops-19569}, doi = {10.4230/DagSemProc.09031.11}, annote = {Keywords: Sequences, synthesis, decimation, parallelism, LFSRs, FCSRs} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Sebastiaan Indesteege and Bart Preneel. Practical Collisions for EnRUPT. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.12, author = {Indesteege, Sebastiaan and Preneel, Bart}, title = {{Practical Collisions for EnRUPT}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.12}, URN = {urn:nbn:de:0030-drops-19509}, doi = {10.4230/DagSemProc.09031.12}, annote = {Keywords: EnRUPT, SHA-3 candidate, hash function, collision attack} }
Feedback for Dagstuhl Publishing