Abstract
Today I’m presenting permanent re-encryption. How to survive generations of crypt analysis to come. [...] And, I was told by Frank that I should use the first five minutes in order to convey the important message. So, thanks a lot. Thanks for your continuing excellent work in exploring, novel ciphers, cryptanalysis, in really building new crypto algorithms, and, in particular, into breaking them. Thanks for your recent advances in this field. And, a very special thanks to the team in Amsterdam and Google for breaking Sha1 just a week ago, because this gives me a perfect introduction into my talk.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Völp, M. (2017). Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion). In: Stajano, F., Anderson, J., Christianson, B., Matyáš, V. (eds) Security Protocols XXV. Security Protocols 2017. Lecture Notes in Computer Science(), vol 10476. Springer, Cham. https://doi.org/10.1007/978-3-319-71075-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-71075-4_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71074-7
Online ISBN: 978-3-319-71075-4
eBook Packages: Computer ScienceComputer Science (R0)