License: Creative Commons Attribution 3.0 Unported license (CC BY 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagRep.8.1.1
URN: urn:nbn:de:0030-drops-92832
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2018/9283/
Go back to Dagstuhl Reports


Daemen, Joan ; Iwata, Tetsu ; Leander, Nils Gregor ; Nyberg, Kaisa
Weitere Beteiligte (Hrsg. etc.): Joan Daemen and Tetsu Iwata and Nils Gregor Leander and Kaisa Nyberg

Symmetric Cryptography (Dagstuhl Seminar 18021)

pdf-format:
dagrep_v008_i001_p001_18021.pdf (2 MB)


Abstract

This report documents the program and the outcomes of Dagstuhl Seminar 18021 "Symmetric Cryptography", which was held on January 7-12, 2018 in Schloss Dagstuhl - Leibniz Center for Informatics. The seminar was the sixth in a series of Dagstuhl seminars on "Symmetric Cryptography", previously held in 2007, 2009, 2012, 2014, and 2016.

During the seminar, many of the participants presented their current research in the design, analysis, and application of symmetric cryptographic algorithms, including ongoing work and open problems. This report documents the abstracts or extended abstracts of the talks presented during the seminar, as well as summaries of the discussion sessions.

BibTeX - Entry

@Article{daemen_et_al:DR:2018:9283,
  author =	{Joan Daemen and Tetsu Iwata and Nils Gregor Leander and Kaisa Nyberg},
  title =	{{Symmetric Cryptography (Dagstuhl Seminar 18021)}},
  pages =	{1--32},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2018},
  volume =	{8},
  number =	{1},
  editor =	{Joan Daemen and Tetsu Iwata and Nils Gregor Leander and Kaisa Nyberg},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2018/9283},
  URN =		{urn:nbn:de:0030-drops-92832},
  doi =		{10.4230/DagRep.8.1.1},
  annote =	{Keywords: symmetric cryptography, cryptanalysis, authenticated encryption, cryptography for IoT, mass surveillance}
}

Keywords: symmetric cryptography, cryptanalysis, authenticated encryption, cryptography for IoT, mass surveillance
Collection: Dagstuhl Reports, Volume 8, Issue 1
Issue Date: 2018
Date of publication: 20.07.2018


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI