Dagstuhl Seminar 26371
Real-World Cryptography
( Sep 06 – Sep 11, 2026 )
Permalink
Organizers
- Marc Fischlin (TU Darmstadt, DE)
- Nadia Heninger (University of California - San Diego, US)
- Alexander May (Ruhr-Universität Bochum, DE)
- Kenneth G. Paterson (ETH Zürich, CH)
Contact
- Michael Gerke (for scientific matters)
- Christina Schwarz (for administrative matters)
Topic Areas
Cryptography is essential in securing real-world digital protocols we rely on daily, including messaging systems, payment platforms, and data exchanges. These systems use complex cryptographic algorithms to secure communication channels, ensuring confidentiality, integrity, and authentication. As digital communication grows, cryptographic research is critical to developing more secure, scalable, and efficient protocols for real-world applications. Unfortunately, the fast-paced need to develop and deploy cryptographic algorithms may easily lead to fragile solutions, as discovered weaknesses in protocols used in actual systems to protect personal data show.
The goal of this Dagstuhl Seminar is to advance the most important areas of real-world cryptography and, orthogonal to that, the techniques required in this domain. The topics to be discussed at the seminar are:
- Secure Messaging covers all topics about establishing a trustworthy, asynchronous communication setup between users and their devices.
- Cryptocurrencies covers all relevant topics in the area of anonymous transactions.
- Distributed Computing covers the areas of cloud computing, cloud storage, and multi-party computations.
The techniques to be investigated are:
- Post-quantum transformation deals with techniques to secure systems against potential quantum attackers.
- Protocol scrutiny is about the analysis of existing protocols.
- Cryptanalysis is about investigating the strength of cryptographic primitives and the potential effects on protocols deploying these primitives.
Structure and Goal
To support collaborations, the seminar will give sufficient time for guided and spontaneous assemblies. About 2–3 months before the seminar, the organizers will collect promising research topics to work on with the participants. There will be presentations and contributed talks introducing the research topics in the morning sessions. For the afternoon sessions, the participants will split into smaller groups working on the identified open problems from the morning sessions. Individual afternoon sessions will be assigned a discussion lead; the participants will give a short update in the session the following day.

Related Seminars
- Dagstuhl Seminar 9339: Cryptography (1993-09-27 - 1993-10-01) (Details)
- Dagstuhl Seminar 9739: Cryptography (1997-09-22 - 1997-09-26) (Details)
- Dagstuhl Seminar 02391: Cryptography (2002-09-22 - 2002-09-27) (Details)
- Dagstuhl Seminar 07381: Cryptography (2007-09-16 - 2007-09-21) (Details)
- Dagstuhl Seminar 11391: Public-Key Cryptography (2011-09-25 - 2011-09-30) (Details)
- Dagstuhl Seminar 16371: Public-Key Cryptography (2016-09-11 - 2016-09-16) (Details)
Classification
- Cryptography and Security
Keywords
- Real-world cryptographic protocols (cloud
- proofs of knowledge
- messaging)
- Post-quantum cryptography
- Protocol Failures