TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 26371

Real-World Cryptography

( 06. Sep – 11. Sep, 2026 )

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/26371

Organisatoren

Kontakt

Motivation

Topic Areas

Cryptography is essential in securing real-world digital protocols we rely on daily, including messaging systems, payment platforms, and data exchanges. These systems use complex cryptographic algorithms to secure communication channels, ensuring confidentiality, integrity, and authentication. As digital communication grows, cryptographic research is critical to developing more secure, scalable, and efficient protocols for real-world applications. Unfortunately, the fast-paced need to develop and deploy cryptographic algorithms may easily lead to fragile solutions, as discovered weaknesses in protocols used in actual systems to protect personal data show.

The goal of this Dagstuhl Seminar is to advance the most important areas of real-world cryptography and, orthogonal to that, the techniques required in this domain. The topics to be discussed at the seminar are:

  1. Secure Messaging covers all topics about establishing a trustworthy, asynchronous communication setup between users and their devices.
  2. Cryptocurrencies covers all relevant topics in the area of anonymous transactions.
  3. Distributed Computing covers the areas of cloud computing, cloud storage, and multi-party computations.

The techniques to be investigated are:

  1. Post-quantum transformation deals with techniques to secure systems against potential quantum attackers.
  2. Protocol scrutiny is about the analysis of existing protocols.
  3. Cryptanalysis is about investigating the strength of cryptographic primitives and the potential effects on protocols deploying these primitives.

Structure and Goal

To support collaborations, the seminar will give sufficient time for guided and spontaneous assemblies. About 2–3 months before the seminar, the organizers will collect promising research topics to work on with the participants. There will be presentations and contributed talks introducing the research topics in the morning sessions. For the afternoon sessions, the participants will split into smaller groups working on the identified open problems from the morning sessions. Individual afternoon sessions will be assigned a discussion lead; the participants will give a short update in the session the following day.

Copyright Marc Fischlin, Nadia Heninger, Alexander May, and Kenneth G. Paterson

Verwandte Seminare
  • Dagstuhl-Seminar 9339: Cryptography (1993-09-27 - 1993-10-01) (Details)
  • Dagstuhl-Seminar 9739: Cryptography (1997-09-22 - 1997-09-26) (Details)
  • Dagstuhl-Seminar 02391: Cryptography (2002-09-22 - 2002-09-27) (Details)
  • Dagstuhl-Seminar 07381: Cryptography (2007-09-16 - 2007-09-21) (Details)
  • Dagstuhl-Seminar 11391: Public-Key Cryptography (2011-09-25 - 2011-09-30) (Details)
  • Dagstuhl-Seminar 16371: Public-Key Cryptography (2016-09-11 - 2016-09-16) (Details)

Klassifikation
  • Cryptography and Security

Schlagworte
  • Real-world cryptographic protocols (cloud
  • proofs of knowledge
  • messaging)
  • Post-quantum cryptography
  • Protocol Failures