Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Eli Biham, Helena Handschuh, Stefan Lucks, and Vincent Rijmen. 07021 Abstracts Collection – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{biham_et_al:DagSemProc.07021.1, author = {Biham, Eli and Handschuh, Helena and Lucks, Stefan and Rijmen, Vincent}, title = {{07021 Abstracts Collection – Symmetric Cryptography}}, booktitle = {Symmetric Cryptography}, pages = {1--15}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.1}, URN = {urn:nbn:de:0030-drops-10373}, doi = {10.4230/DagSemProc.07021.1}, annote = {Keywords: Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Provable Security, Cryptanalysis} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Eli Biham, Helena Handschuh, Stefan Lucks, and Vincent Rijmen. 07021 Executive Summary – Symmetric Cryptography. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{biham_et_al:DagSemProc.07021.2, author = {Biham, Eli and Handschuh, Helena and Lucks, Stefan and Rijmen, Vincent}, title = {{07021 Executive Summary – Symmetric Cryptography}}, booktitle = {Symmetric Cryptography}, pages = {1--3}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.2}, URN = {urn:nbn:de:0030-drops-10204}, doi = {10.4230/DagSemProc.07021.2}, annote = {Keywords: Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Provable Security, Cryptanalysis} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Stefan Lucks. A Collision-Resistant Rate-1 Double-Block-Length Hash Function. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{lucks:DagSemProc.07021.3, author = {Lucks, Stefan}, title = {{A Collision-Resistant Rate-1 Double-Block-Length Hash Function}}, booktitle = {Symmetric Cryptography}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.3}, URN = {urn:nbn:de:0030-drops-10172}, doi = {10.4230/DagSemProc.07021.3}, annote = {Keywords: Hash function, provable security, double-block-length} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Kaisa Nyberg and Risto Hakala. A Key-Recovery Attack on SOBER-128. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{nyberg_et_al:DagSemProc.07021.4, author = {Nyberg, Kaisa and Hakala, Risto}, title = {{A Key-Recovery Attack on SOBER-128}}, booktitle = {Symmetric Cryptography}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.4}, URN = {urn:nbn:de:0030-drops-10188}, doi = {10.4230/DagSemProc.07021.4}, annote = {Keywords: Linear approximations, correlation, linear cryptanalysis, key recovery attack, piling-up lemma, SOBER-128} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Alex Biryukov. Block and Stream Ciphers and the Creatures in Between. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{biryukov:DagSemProc.07021.5, author = {Biryukov, Alex}, title = {{Block and Stream Ciphers and the Creatures in Between}}, booktitle = {Symmetric Cryptography}, pages = {1--9}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.5}, URN = {urn:nbn:de:0030-drops-10387}, doi = {10.4230/DagSemProc.07021.5}, annote = {Keywords: Stream ciphers, block ciphers} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Markus Dichtl. Cryptographic Shuffling of Random and Pseudorandom Sequences. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{dichtl:DagSemProc.07021.6, author = {Dichtl, Markus}, title = {{Cryptographic Shuffling of Random and Pseudorandom Sequences}}, booktitle = {Symmetric Cryptography}, pages = {1--4}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.6}, URN = {urn:nbn:de:0030-drops-10141}, doi = {10.4230/DagSemProc.07021.6}, annote = {Keywords: Shuffling stream-cipher} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Gregory G. Rose, Philip Hawkes, Michael Paddon, Cameron McDonald, and Miriam Wiggers de Vries. Design and Primitive Specification for Shannon. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{rose_et_al:DagSemProc.07021.7, author = {Rose, Gregory G. and Hawkes, Philip and Paddon, Michael and McDonald, Cameron and Wiggers de Vries, Miriam}, title = {{Design and Primitive Specification for Shannon}}, booktitle = {Symmetric Cryptography}, pages = {1--19}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.7}, URN = {urn:nbn:de:0030-drops-10198}, doi = {10.4230/DagSemProc.07021.7}, annote = {Keywords: Stream cipher} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Nicolas T. Courtois. How Fast can be Algebraic Attacks on Block Ciphers?. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{courtois:DagSemProc.07021.8, author = {Courtois, Nicolas T.}, title = {{How Fast can be Algebraic Attacks on Block Ciphers?}}, booktitle = {Symmetric Cryptography}, pages = {1--6}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.8}, URN = {urn:nbn:de:0030-drops-10130}, doi = {10.4230/DagSemProc.07021.8}, annote = {Keywords: Algebraic Attacks On Block Ciphers, XSL attacks, AES, DES, SAT Solvers, T' method, Gr\~{A}ƒ\^{A}¶bner bases} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert, and Jacques Patarin. QUAD: Overview and Recent Developments. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{arditti_et_al:DagSemProc.07021.9, author = {Arditti, David and Berbain, C\^{o}me and Billet, Olivier and Gilbert, Henri and Patarin, Jacques}, title = {{QUAD: Overview and Recent Developments}}, booktitle = {Symmetric Cryptography}, pages = {1--20}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.9}, URN = {urn:nbn:de:0030-drops-10155}, doi = {10.4230/DagSemProc.07021.9}, annote = {Keywords: MQ problem, stream cipher, provable security, Gr\~{A}ƒ\^{A}¶bner basis} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Tetsu Iwata. Tightness of the Security Bound of CENC. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{iwata:DagSemProc.07021.10, author = {Iwata, Tetsu}, title = {{Tightness of the Security Bound of CENC}}, booktitle = {Symmetric Cryptography}, pages = {1--6}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.10}, URN = {urn:nbn:de:0030-drops-10169}, doi = {10.4230/DagSemProc.07021.10}, annote = {Keywords: Encryption mode, blockcipher, CENC, provable security} }
Published in: Dagstuhl Seminar Proceedings, Volume 7021, Symmetric Cryptography (2007)
Erik Zenner. Why IV Setup for Stream Ciphers is Difficult. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 7021, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{zenner:DagSemProc.07021.11, author = {Zenner, Erik}, title = {{Why IV Setup for Stream Ciphers is Difficult}}, booktitle = {Symmetric Cryptography}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {7021}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07021.11}, URN = {urn:nbn:de:0030-drops-10126}, doi = {10.4230/DagSemProc.07021.11}, annote = {Keywords: Stream cipher, IV setup} }
Feedback for Dagstuhl Publishing