|
IntroductionThe most fundamental promise made by cryptography is that a sender and receiver, starting from nothing more than shared knowledge of a secret key, can securely exchange messages. Secret-key cryptography protects the confidentiality and integrity of the messages against any possible misbehavior by the intermediate network. Unfortunately, the trust that users place in secret-key cryptography has been repeatedly and flagrantly violated. Will the requirements of the users be better met by the next generation of authenticated ciphers? The purpose of DIAC 2014 is to evaluate the state of the art in authenticated encryption and gather community input regarding desired future directions. DIAC 2014 emphasizes the most recent research. Comparisons of submissions to the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) are welcome. Cryptanalysis of ciphers (whether submissions or not), viewed as guidance for designers, is also welcome. Presentations of ideas for future ciphers are also welcome. Submissions of panel proposals, white papers, lists of desiderata, etc. are also welcome. See the submission page for a more comprehensive list of DIAC 2014 topics. DIAC 2014 will take place at the University of California at Santa Barbara. The formal DIAC 2014 program will begin in the morning of Saturday 23 August and will end in the late afternoon of Sunday 24 August. DIAC 2014 will immediately follow the SHA-3 2014 Workshop, which takes place on Friday 22 August. The SHA-3 Workshop will immediately follow Crypto 2014, a top conference in theoretical cryptography; Crypto 2014 begins Sunday 17 August and ends Thursday 21 August. DIAC 2014 is a followup to the ECRYPT DIAC workshop in Stockholm in July 2012 and the DIAC 2013 workshop in Chicago in August 2013. Important dates
SponsorsDIAC 2014 is partly supported by NIST grant 60NANB12D261. Version: This is version 2014.07.18 of the index.html web page. |