https://mirohaller.com
youtube.com/playlist?lis...
Or view the CAW 2024 program here: caw.cryptanalysis.fun/previous/202...
youtube.com/playlist?lis...
Or view the CAW 2024 program here: caw.cryptanalysis.fun/previous/202...
4. The industry perspective on deployment and maintenance of cryptography in practice.
All info on how to submit is here caw.cryptanalysis.fun#call-for-talks
4. The industry perspective on deployment and maintenance of cryptography in practice.
All info on how to submit is here caw.cryptanalysis.fun#call-for-talks
1. Bringing crypto from academia into the world.
2. Analysis and proofs of schemes and protocols deployed in practice.
1. Bringing crypto from academia into the world.
2. Analysis and proofs of schemes and protocols deployed in practice.
The workshop consists of a mixture of invited and contributed talks on recent developments in the field of applied cryptography.
The workshop consists of a mixture of invited and contributed talks on recent developments in the field of applied cryptography.
And if you're in Seattle, come say hi at WOOT or USENIX!
Blog post: mirohaller.com/posts/2025/0...
Paper: www.usenix.org/system/files...
And if you're in Seattle, come say hi at WOOT or USENIX!
Blog post: mirohaller.com/posts/2025/0...
Paper: www.usenix.org/system/files...
Rolfe Schmidt from @signal.org on "Designing a Post-Quantum Ratchet for Signal Messenger"; seeking feedback on their candidate designs to make the Double Ratchet protocol post-quantum secure.
caw.cryptanalysis.fun
Rolfe Schmidt from @signal.org on "Designing a Post-Quantum Ratchet for Signal Messenger"; seeking feedback on their candidate designs to make the Double Ratchet protocol post-quantum secure.
caw.cryptanalysis.fun
Phillip Gajland on "Shadofax: Combiners for Deniability"; providing a framework to reason about deniability for hybrid schemes and achieve it for a post-quantum secure AKEM.
caw.cryptanalysis.fun
Phillip Gajland on "Shadofax: Combiners for Deniability"; providing a framework to reason about deniability for hybrid schemes and achieve it for a post-quantum secure AKEM.
caw.cryptanalysis.fun
Emma Dauterman on "Designing Secret Recovery in Signal Messenger"; a restrospective on the lessons learned when designing a system to meet real-world constraints.
caw.cryptanalysis.fun
Emma Dauterman on "Designing Secret Recovery in Signal Messenger"; a restrospective on the lessons learned when designing a system to meet real-world constraints.
caw.cryptanalysis.fun
Lea Thiemt on "Generic Anonymity Wrapper for Messaging Protocols"; a protocol transformation that achieves forward anonymity and post-compromise anonymity.
caw.cryptanalysis.fun
Lea Thiemt on "Generic Anonymity Wrapper for Messaging Protocols"; a protocol transformation that achieves forward anonymity and post-compromise anonymity.
caw.cryptanalysis.fun
Giacomo Fenzi @giacomofenzi.bsky.social on "Linear-Time Accumulation Schemes"; an efficient hash-based building block for proof-carrying data to provide computational integrity in a distributed setting.
caw.cryptanalysis.fun
Giacomo Fenzi @giacomofenzi.bsky.social on "Linear-Time Accumulation Schemes"; an efficient hash-based building block for proof-carrying data to provide computational integrity in a distributed setting.
caw.cryptanalysis.fun
Felix Günther on "(Hybrid) Obfuscation and Verifiable Decapsulation"; two concepts to make KEMs more secure in real-world protocols.
caw.cryptanalysis.fun
Felix Günther on "(Hybrid) Obfuscation and Verifiable Decapsulation"; two concepts to make KEMs more secure in real-world protocols.
caw.cryptanalysis.fun
Olga Sanina presents "Results from Analyzing and Refining Bluetooth Secure Connections" about modeling and authenticating Bluetooth.
caw.cryptanalysis.fun
Olga Sanina presents "Results from Analyzing and Refining Bluetooth Secure Connections" about modeling and authenticating Bluetooth.
caw.cryptanalysis.fun
Shai Halevi or Nevine Ebeid (or both) from AWS on "Blockcipher-Based Key Commitment for Nonce-Derived Schemes"; towards the FIPS-compliant deployment of XAES-256-GCM.
caw.cryptanalysis.fun
Shai Halevi or Nevine Ebeid (or both) from AWS on "Blockcipher-Based Key Commitment for Nonce-Derived Schemes"; towards the FIPS-compliant deployment of XAES-256-GCM.
caw.cryptanalysis.fun
Ghous Amjad (Google) on the design and deployment of "RSA Blind Signatures with Public Metadata" in GoogleOne VPN.
caw.cryptanalysis.fun
Ghous Amjad (Google) on the design and deployment of "RSA Blind Signatures with Public Metadata" in GoogleOne VPN.
caw.cryptanalysis.fun