License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.07381.2
URN: urn:nbn:de:0030-drops-12928
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1292/
Go to the corresponding Portal |
Blömer, Johannes ;
Boneh, Dan ;
Cramer, Ronald ;
Maurer, Ueli
07381 Executive Summary - Cryptography
Abstract
The topics covered in the seminar spanned most areas of cryptography,
in one way or another, both in terms of the types of schemes
(public-key cryptography, symmetric cryptography, hash functions and
other cryptographic functions, multi-party protocols, etc.) and in terms of the
mathematical methods and techniques used (algebra, number theory,
elliptic curves, probability theory, information theory,
combinatorics, quantum theory, etc.). The range of applications
addressed in the various talks was broad, ranging from secure
communication, key management, authentication, digital signatures and
payment systems to e-voting and Internet security.
While the initial plan had been to focus more exclusively on public-key
cryptography, it turned out that this sub-topic branches out into
many other areas of cryptography and therefore the organizers
decided to expand the scope, emphasizing quality rather than
close adherence to public-key cryptography. This decision turned
out to be a wise one.
What was common to almost all the talks is that rigorous mathematical
proofs for the security of the presented schemes were given. In fact,
a central topic of many of the talks were proof methodologies for
various contexts.
BibTeX - Entry
@InProceedings{blomer_et_al:DagSemProc.07381.2,
author = {Bl\"{o}mer, Johannes and Boneh, Dan and Cramer, Ronald and Maurer, Ueli},
title = {{07381 Executive Summary - Cryptography}},
booktitle = {Cryptography},
pages = {1--2},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {7381},
editor = {Johannes Bl\"{o}mer and Dan Boneh and Ronald Cramer and Ueli Maurer},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2008/1292},
URN = {urn:nbn:de:0030-drops-12928},
doi = {10.4230/DagSemProc.07381.2},
annote = {Keywords: Cryptography, information security, public-key cryptography, cryptographic protocols, security proofs}
}
Keywords: |
|
Cryptography, information security, public-key cryptography, cryptographic protocols, security proofs |
Collection: |
|
07381 - Cryptography |
Issue Date: |
|
2008 |
Date of publication: |
|
08.01.2008 |