Published in: Dagstuhl Reports, Volume 2, Issue 1 (2012)
Frederik Armknecht, Stefan Lucks, Bart Preneel, and Phillip Rogaway. Symmetric Cryptography (Dagstuhl Seminar 12031). In Dagstuhl Reports, Volume 2, Issue 1, pp. 39-49, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{armknecht_et_al:DagRep.2.1.39, author = {Armknecht, Frederik and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{Symmetric Cryptography (Dagstuhl Seminar 12031)}}, pages = {39--49}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {Armknecht, Frederik and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.39}, URN = {urn:nbn:de:0030-drops-34569}, doi = {10.4230/DagRep.2.1.39}, annote = {Keywords: Hash functions, Feistel networks, BLAKE, KLEIN, Keccak, IDEA, GCM, EAXprime, TLS, KISS} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Jorge Nakahara and Daniel Santana de Freitas. Mini-ciphers: a reliable testbed for cryptanalysis?. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{nakahara_et_al:DagSemProc.09031.9, author = {Nakahara, Jorge and Santana de Freitas, Daniel}, title = {{Mini-ciphers: a reliable testbed for cryptanalysis?}}, booktitle = {Symmetric Cryptography}, pages = {1--13}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.9}, URN = {urn:nbn:de:0030-drops-19614}, doi = {10.4230/DagSemProc.09031.9}, annote = {Keywords: Mini-ciphers, higher-order square attacks} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway. 09031 Abstracts Collection – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{handschuh_et_al:DagSemProc.09031.1, author = {Handschuh, Helena and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{09031 Abstracts Collection – Symmetric Cryptography }}, booktitle = {Symmetric Cryptography}, pages = {1--17}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.1}, URN = {urn:nbn:de:0030-drops-19603}, doi = {10.4230/DagSemProc.09031.1}, annote = {Keywords: Symmetric cryptography, symmetric primitives and cryptoschemes, hash functions, block ciphers, stream ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Helena Handschuh, Stefan Lucks, Bart Preneel, and Phillip Rogaway. 09031 Executive Summary – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{handschuh_et_al:DagSemProc.09031.2, author = {Handschuh, Helena and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{09031 Executive Summary – Symmetric Cryptography}}, booktitle = {Symmetric Cryptography}, pages = {1--3}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.2}, URN = {urn:nbn:de:0030-drops-19590}, doi = {10.4230/DagSemProc.09031.2}, annote = {Keywords: Symmetric cryptography, symmetric primitives and cryptoschemes, hash functions, block ciphers, stream ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Matthias Krause and Dirk Stegemann. Algebraic Attacks against Linear RFID Authentication Protocols. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{krause_et_al:DagSemProc.09031.3, author = {Krause, Matthias and Stegemann, Dirk}, title = {{Algebraic Attacks against Linear RFID Authentication Protocols}}, booktitle = {Symmetric Cryptography}, pages = {1--18}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.3}, URN = {urn:nbn:de:0030-drops-19576}, doi = {10.4230/DagSemProc.09031.3}, annote = {Keywords: RFID Authentication, HB+, CKK, CKK2} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Erik Zenner. Cache Timing Analysis of eStream Finalists. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-8, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{zenner:DagSemProc.09031.4, author = {Zenner, Erik}, title = {{Cache Timing Analysis of eStream Finalists}}, booktitle = {Symmetric Cryptography}, pages = {1--8}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.4}, URN = {urn:nbn:de:0030-drops-19437}, doi = {10.4230/DagSemProc.09031.4}, annote = {Keywords: Cache timing attacks, stream ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Ewan Fleischmann, Christian Forler, and Michael Gorski. Classification of the SHA-3 Candidates. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{fleischmann_et_al:DagSemProc.09031.5, author = {Fleischmann, Ewan and Forler, Christian and Gorski, Michael}, title = {{Classification of the SHA-3 Candidates}}, booktitle = {Symmetric Cryptography}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.5}, URN = {urn:nbn:de:0030-drops-19482}, doi = {10.4230/DagSemProc.09031.5}, annote = {Keywords: Hash function, SHA-3, classification} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Jean-Philippe Aumasson, Itai Dinur, Willi Meier, and Adi Shamir. Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{aumasson_et_al:DagSemProc.09031.6, author = {Aumasson, Jean-Philippe and Dinur, Itai and Meier, Willi and Shamir, Adi}, title = {{Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium}}, booktitle = {Symmetric Cryptography}, pages = {1--22}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.6}, URN = {urn:nbn:de:0030-drops-19443}, doi = {10.4230/DagSemProc.09031.6}, annote = {Keywords: Cube attacks, property testing, MD6, Trivium} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen. Grøstl - a SHA-3 candidate. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-33, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{gauravaram_et_al:DagSemProc.09031.7, author = {Gauravaram, Praveen and Knudsen, Lars R. and Matusiewicz, Krystian and Mendel, Florian and Rechberger, Christian and Schl\"{a}ffer, Martin and Thomsen, S{\o}ren S.}, title = {{Gr{\o}stl - a SHA-3 candidate}}, booktitle = {Symmetric Cryptography}, pages = {1--33}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.7}, URN = {urn:nbn:de:0030-drops-19554}, doi = {10.4230/DagSemProc.09031.7}, annote = {Keywords: SHA-3 proposal, hash function} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Anne Canteaut and Maria Naya-Plasencia. Internal collision attack on Maraca. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{canteaut_et_al:DagSemProc.09031.8, author = {Canteaut, Anne and Naya-Plasencia, Maria}, title = {{Internal collision attack on Maraca}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.8}, URN = {urn:nbn:de:0030-drops-19538}, doi = {10.4230/DagSemProc.09031.8}, annote = {Keywords: Hash function, collision attack, differential cryptanalysis, Boolean function} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Johannes A. Buchmann, Jintai Ding, Mohamed Saied Emam Mohamed, and Wael Said Abd Elmageed Mohamed. MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{buchmann_et_al:DagSemProc.09031.10, author = {Buchmann, Johannes A. and Ding, Jintai and Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed}, title = {{MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis}}, booktitle = {Symmetric Cryptography}, pages = {1--7}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.10}, URN = {urn:nbn:de:0030-drops-19456}, doi = {10.4230/DagSemProc.09031.10}, annote = {Keywords: Multivariate systems, MutantXL} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Andrea Röck and Cédric Lauradoux. Parallel Generation of l-Sequences. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{rock_et_al:DagSemProc.09031.11, author = {R\"{o}ck, Andrea and Lauradoux, C\'{e}dric}, title = {{Parallel Generation of l-Sequences}}, booktitle = {Symmetric Cryptography}, pages = {1--6}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.11}, URN = {urn:nbn:de:0030-drops-19569}, doi = {10.4230/DagSemProc.09031.11}, annote = {Keywords: Sequences, synthesis, decimation, parallelism, LFSRs, FCSRs} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Sebastiaan Indesteege and Bart Preneel. Practical Collisions for EnRUPT. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.12, author = {Indesteege, Sebastiaan and Preneel, Bart}, title = {{Practical Collisions for EnRUPT}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.12}, URN = {urn:nbn:de:0030-drops-19509}, doi = {10.4230/DagSemProc.09031.12}, annote = {Keywords: EnRUPT, SHA-3 candidate, hash function, collision attack} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Sebastiaan Indesteege and Bart Preneel. Practical Preimages for Maraca. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{indesteege_et_al:DagSemProc.09031.13, author = {Indesteege, Sebastiaan and Preneel, Bart}, title = {{Practical Preimages for Maraca}}, booktitle = {Symmetric Cryptography}, pages = {1--2}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.13}, URN = {urn:nbn:de:0030-drops-19512}, doi = {10.4230/DagSemProc.09031.13}, annote = {Keywords: Maraca, hash function, preimage attack} }
Published in: Dagstuhl Seminar Proceedings, Volume 9031, Symmetric Cryptography (2009)
Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{hermelin_et_al:DagSemProc.09031.14, author = {Hermelin, Miia and Cho, Joo Yeon and Nyberg, Kaisa}, title = {{Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1}}, booktitle = {Symmetric Cryptography}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.14}, URN = {urn:nbn:de:0030-drops-19541}, doi = {10.4230/DagSemProc.09031.14}, annote = {Keywords: Block cipher, key recovery attacks, key ranking, linear cryptanalysis, multidimensional approximation} }
Feedback for Dagstuhl Publishing