TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Dagstuhl Seminar 26371

Real-World Cryptography

( Sep 06 – Sep 11, 2026 )

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/26371

Organizers

Contact

Motivation

Topic Areas

Cryptography is essential in securing real-world digital protocols we rely on daily, including messaging systems, payment platforms, and data exchanges. These systems use complex cryptographic algorithms to secure communication channels, ensuring confidentiality, integrity, and authentication. As digital communication grows, cryptographic research is critical to developing more secure, scalable, and efficient protocols for real-world applications. Unfortunately, the fast-paced need to develop and deploy cryptographic algorithms may easily lead to fragile solutions, as discovered weaknesses in protocols used in actual systems to protect personal data show.

The goal of this Dagstuhl Seminar is to advance the most important areas of real-world cryptography and, orthogonal to that, the techniques required in this domain. The topics to be discussed at the seminar are:

  1. Secure Messaging covers all topics about establishing a trustworthy, asynchronous communication setup between users and their devices.
  2. Cryptocurrencies covers all relevant topics in the area of anonymous transactions.
  3. Distributed Computing covers the areas of cloud computing, cloud storage, and multi-party computations.

The techniques to be investigated are:

  1. Post-quantum transformation deals with techniques to secure systems against potential quantum attackers.
  2. Protocol scrutiny is about the analysis of existing protocols.
  3. Cryptanalysis is about investigating the strength of cryptographic primitives and the potential effects on protocols deploying these primitives.

Structure and Goal

To support collaborations, the seminar will give sufficient time for guided and spontaneous assemblies. About 2–3 months before the seminar, the organizers will collect promising research topics to work on with the participants. There will be presentations and contributed talks introducing the research topics in the morning sessions. For the afternoon sessions, the participants will split into smaller groups working on the identified open problems from the morning sessions. Individual afternoon sessions will be assigned a discussion lead; the participants will give a short update in the session the following day.

Copyright Marc Fischlin, Nadia Heninger, Alexander May, and Kenneth G. Paterson

Related Seminars
  • Dagstuhl Seminar 9339: Cryptography (1993-09-27 - 1993-10-01) (Details)
  • Dagstuhl Seminar 9739: Cryptography (1997-09-22 - 1997-09-26) (Details)
  • Dagstuhl Seminar 02391: Cryptography (2002-09-22 - 2002-09-27) (Details)
  • Dagstuhl Seminar 07381: Cryptography (2007-09-16 - 2007-09-21) (Details)
  • Dagstuhl Seminar 11391: Public-Key Cryptography (2011-09-25 - 2011-09-30) (Details)
  • Dagstuhl Seminar 16371: Public-Key Cryptography (2016-09-11 - 2016-09-16) (Details)

Classification
  • Cryptography and Security

Keywords
  • Real-world cryptographic protocols (cloud
  • proofs of knowledge
  • messaging)
  • Post-quantum cryptography
  • Protocol Failures