The Cryptographic Applications Workshop will take place on Sunday, May 10, 2026 in Rome, Italy as affiliated event of Eurocrypt 2026.

workshop description

The Cryptographic Applications Workshop (CAW; the constructive twin of WAC) focuses on the construction and analysis of cryptography built for practice.
Inspired by the Real World Crypto Symposium, it aims to provide a forum for cryptographers in academia and industry to exchange ideas and insights, bridging the gap between research and real-world applications. The main themes of CAW are

  1. formalizing the security of deployed cryptography,
  2. constructing cryptographic primitives and systems for practice, and
  3. the industry perspective on deployment and maintenance of cryptography.

The workshop consists of a mixture of invited and contributed talks on recent contributions and developments in the field of applied cryptography.

program

Sunday May 10, 2026
08:30—09:00 (CEST) registration
09:00—09:05 (CEST)

Abstract

The organizers will kick of the workshop by introducing this year's theme of "cryptography under real-world constraints and threat models" as well as briefly explaining the workshop logistics.

Authors/Presenters:

  • Matilda Backendal (ETH Zurich) [presenter]
  • Miro Haller (UC San Diego) [presenter]
  • Laura Hetz (ETH Zurich) [presenter]
  • Matteo Scarlata (ETH Zurich) [presenter]
  • Kien Tuong Truong (ETH Zurich) [presenter]
session on real-world threat models
09:05—09:35 (CEST)

Abstract

TBD

Authors/Presenters:

  • Tim Rausch (CISPA Helmholtz Center for Information Security) [presenter]

    Tim is a PhD student who is particularly interested in building practical and efficient privacy-preserving systems to solve real-world problems.

  • Sylvain Chatel (CISPA Helmholtz Center for Information Security)
  • Wouter Lueks (CISPA Helmholtz Center for Information Security)
09:35—10:20 (CEST)

Abstract

We introduce a technique for determining security goals. Given that games and ideal functionalities model specific social relations between various honest and adversarial parties, our methodology is ethnography: a careful social science methodology for studying social relations in their contexts. As a first application of this technique, i.e. ethnography in cryptography, we study security at-compromise (neither pre- nor post-) and introduce the security goal of alert blindness. Specifically, in our 2024–2025 six-and-a-half-month ethnographic fieldwork with protesters in Kenya, we observed that alert blindness captures a security goal of abducted persons who were taken by Kenyan security forces for their presumed activism. This talk will draw on the ethnographic work, demonstrating how we can use what we learn from ethnography to establish cryptographic security notions.

This work is focusing on the ethnography for the author's paper with the same title that is published at Eurocrypt 2026 [1].

[1] Albrecht, Colombo, Dowling, Jensen. At-Compromise Security The Case for Alert Blindness. Eurocrypt 2026.

Authors/Presenters:

  • Martin R. Albrecht (King's College London)
  • Simone Colombo (King's College London)
  • Benjamin Dowling (King's College London)
  • Rikke Bjerg Jensen (Royal Holloway, University of London) [presenter]

    Rikke is an ethnographer and conducted the fieldwork in this work. She is also a professor in the Information Security Group at Royal Holloway, University of London. Rikke has given a range of talks with a focus on information security needs, perspectives and practices among groups in adversarial and marginalised contexts.

10:20—11:00 (CEST) coffee break
session on E2EE systems
11:00—11:25 (CEST)

Abstract

End-to-end encrypted email conflicts with common workflows like forwarding and mailing lists, which require redistributing messages without expanding trust or exposing keys. We present a deployed OpenPGP-compatible design that resolves this using proxied ECDH, enabling transparent re-encryption for final recipients without changing sender behavior or revealing long-term secret keys. Our model keeps intermediaries outside the trust boundary while ensuring recipients can read messages without gaining impersonation capabilities. The approach supports nested forwarding and mailing lists with intact user experience and signature verification. We share lessons from large-scale deployment at Proton, including key management, compatibility, and standardization efforts, and discuss limitations and future work such as updated OpenPGP formats and post-quantum support.

The system design is based on an ICMC 2021 paper [1] and the authors also worked on an IETF draft [1] to integrate this design with OpenPGP.

[1] Vial-Prado, Wussler. OpenPGP Email Forwarding Via Diverted Elliptic Curve Diffie-Hellman Key Exchanges. ICMC 2021.

[2] Wussler. Automatic Forwarding for ECDH Curve25519 OpenPGP messages. IETF draft draft-wussler-openpgp-forwarding-00.

Authors/Presenters:

  • Lara Bruseghini (Proton AG) [presenter]

    Lara is part of the Cryptography team at Proton, working on security features across Proton's web applications, as well as on the underlying cryptographic libraries. She has contributed to the security revision of the IETF OpenPGP specification (RFC 9580) and to other standardization efforts. She holds an MSc from ETH Zurich, with a thesis investigating Key Overwriting (KO) attacks in OpenPGP.

  • Aron Wussler (Proton AG) [presenter]

    Aron is an engineering manager on Proton's Account back-end team. With a background in computer science and mathematical engineering, Aron works on authentication protocols and cryptographic key distribution. Until 2024, he was a cryptography engineer at Proton, focusing on the design and implementation of encryption libraries used across our server infrastructure and mobile applications.

11:25—11:50 (CEST)

Abstract

End-to-end encryption is foundational towards achieving privacy from the eyes of service providers, who are incentivised to collect the largest possible amount of information from their users in order to monetise them. It also protects users from the inevitable data leaks that cloud service providers are frequently subject to.

Online calendars are an extremely popular tool, often housing extensive metadata about our daily personal and business lives. Yet, little rigorous research has been devoted to exploring the issue of securing calendar functionality. In this talk, we present ongoing work towards constructing end-to-end encrypted calendars.

We describe a basic single-user construction, based around a variant of the CSS cloud storage protocol introduced at CRYPTO 2024. We then propose various extensions to achieve commercial calendar functionality, such as range queries, event sharing and RSVP status updates from event attendees.

Authors/Presenters:

  • Tomás Bertoli (UBA Universidad de Buenos Aires)
  • Simone Colombo (King's College London)
  • Benjamin Dowling (King's College London)
  • Fernando Virdia (University of Surrey) [presenter]

    Fernando Virdia is a Lecturer in Cyber Security at the University of Surrey. Fernando's research focuses on applied cryptography and on cryptanalysis of post-quantum hardness assumptions.

11:50—12:00 (CEST)

Abstract

TBD

Authors/Presenters:

  • Gordon Chu (Google) [presenter]

    Gordon is a security engineer at Google, where he specializes in applied cryptography and access control. His work centers on bringing provable security to developers' designs and identifying vulnerabilities in cryptographic protocols.

  • Fernando Lobato Meeser (Google)
session on PQ & messaging
12:00—12:10 (CEST)

Abstract

This talk presents AWS's journey implementing optimal and formally verified FIPS202 (SHA-3/SHAKE) functions, which form a computational backbone of the ML-KEM and ML-DSA post-quantum algorithms now powering millions of cryptographic operations daily across security-critical AWS services. We demonstrate how we resolved the fundamental tension between performance optimization where improvements translate directly to cost savings at AWS scale, and security assurance, where implementation vulnerabilities could compromise entire service ecosystems. Through hand-crafted assembly optimization and mathematical proof via the HOL Light theorem prover, we achieved both significant performance gains and formal correctness guarantees.

Author/Presenter:

  • Mila Anastasova (Amazon Web Services) [presenter]

    Mila Anastasova is an Applied Scientist at Amazon Web Services, where currently she focuses on high-performance cryptographic implementations and formal verification methods for classical and post-quantum cryptography. She earned her Ph.D. from Florida Atlantic University and has spent the past two years at AWS working on production-scale deployments. Her research bridges the gap between theoretical cryptography and practical, high-performance implementations that serve millions of users daily.

12:10—13:00 (CEST)

Abstract

The Signal Protocol, combined with the sender-hiding wrapper protocol Sealed Sender, provides sender-anonymous secure messaging with strong security properties including Forward Secrecy and Post Compromise Security. With the deployment of PQXDH (initial handshake) in 2023 and Triple Ratchet (message encryption) in 2025, Signal has begun transitioning to hybrid post-quantum security, but important gaps remain: The PQXDH handshake does not provide post-quantum authentication, Sealed Sender does not provide Forward Anonymity or post-quantum anonymity, and the current composition of PQXDH and Sealed Sender is computationally expensive due to redundant key material and key agreements.

In this talk we present a new handshake protocol that addresses all of these issues. We use the RingXKEM handshake [1] to attain post-quantum confidentiality and authentication. We hybridize RingXKEM with the XHMQV handshake [2], which reduces the number of elliptic curve operations relative to X3DH [3] to achieve a significant performance improvement and better maximum exposure security, i.e., XHMQV retains security in more compromise scenarios than X3DH. We then present a general construction for Sender Anonymous Key Exchange protocols based on a two-phase handshake: The first phase mixes the sender's ephemeral material with all receiver keys and uses the resulting shared secret to encrypt the remainder of the handshake which uses the sender's identity key.

This structure binds the sender identity to the session while concealing it from observers. Applying this construction to both PQXDH and the RingXKEM-XHMQV hybrid yields Sealed PQXDH and Sealed RingXKEM-XHMQV, which provide strong hybrid sender anonymity with negligible overhead—a small number of hashes and a single symmetric encryption—compared to their unsealed counterparts. Sealed PQXDH is currently in development at Signal; Sealed RingXKEM-XHMQV is Signal's leading candidate for a fully post-quantum handshake protocol.

[1] Hashimoto, Katsumata, Wiggers. Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol. USENIX Security 2025.

[2] Fiedler, Günther, Pan, Zeng. XHMQV: Better Efficiency and Stronger Security for Signal's Initial Handshake based on HMQV. CRYPTO 2025.

[3] Marlinspike, Perrin. The X3DH Key Agreement Protocol.

Authors/Presenters:

  • Rune Fiedler (ETH Zurich) [presenter]

    Rune Fiedler is a postdoc at ETH Zürich in Kenny Paterson's Applied Crypto group. He obtained his PhD from TU Darmstadt under the supervision of Marc Fischlin, where he analyzed and proposed several constructions for Signal's initial handshake with regard to (post-quantum) security and deniability. He is further interested in the broader Secure Messaging ecosystem, deniability in general, and the security of signature schemes in the presence of maliciously generated keys (dubbed the BUFF properties, short for Beyond UnForgeability Features).

  • Rolfe Schmidt (Signal) [presenter]

    Rolfe Schmidt is a Research Engineer at Signal, where he translates ideas from academic research into deployable practice. His work ranges from protocol design and formal verification to TEE engineering and side channel hardening, most recently leading Signal's post-quantum cryptography migration.

  • Lea Thiemt (FAU Erlangen-Nürnberg) [presenter]

    Lea Thiemt is a PhD student in the Real World Cryptography Group at FAU Erlangen-Nürnberg under the supervision of Paul Rösler. In her research, she focuses on the provable security and anonymity of real-world messaging protocols.

13:00—14:30 (CEST) lunch
session on system design
14:30—14:55 (CEST)

Abstract

A client, Phreeli, hired us to consult on a cryptographic solution for operating on unlinkable linkable identifiers for their phone service—an objective that sounds paradoxical until you see the real-world need: enabling continuity and accountability across interactions while preventing observers from monitoring those interactions to derive a traceable profile. Achieving both properties simultaneously is a non-trivial task, not because the primitives are unknown, but because the system inevitably introduces side channels: protocol metadata, timing, rate limits, operational constraints, and trust relationships between parties. In this talk we recount how a seemingly simple requirement quickly became an exercise in disciplined threat modeling, systems thinking, and careful cryptographic engineering.

We ultimately settled on a solution that uses Privacy Pass, threshold OPRFs and hybrid PKE, to achieve the desired "linkable-but-unlinkable" behavior under the client's threat model and operational needs. The resulting design is practical and implementable today, yet it also surfaces open research questions: how to reason about collusion and ecosystem-level metadata leakage, how to do revocation and abuse control without reintroducing tracking, and how to evaluate privacy guarantees in a deployed system rather than in an idealized model. The talk should highlight lessons learned on bridging requirements to cryptography, including lessons of what remained unsolved.

Authors/Presenters:

  • Poulami Das (Least Authority) [presenter]

    Poulami is a cryptography researcher with a PhD in the design of cryptographic and consensus protocols, having authored 10+ research articles, and a senior cryptography analyst at Least Authority. She is passionate about advancing cryptographic techniques to Web3 and beyond.

  • Anna Kaplan (Least Authority) [presenter]

    Anna is a mathematician and cryptographer, with experience working at Zcash Foundation and IBM Research, and a senior cryptography analyst at Least Authority. She is interested in advancements in cryptography and is passionate about making cryptography and privacy more accessible through writing, speaking, and community engagement.

14:55—15:20 (CEST)

Abstract

Shufflecake [1] is a an open source tool that allows creation of multiple hidden volumes on a storage device in such a way that it is very difficult, even under forensic inspection, to prove the existence of such volumes. This is useful for people who are at risk of forced interrogation and prosecution by repressive authorities or dangerous criminal organizations, in particular: whistleblowers, investigative journalists, cypherpunks, and activists for human rights in oppressive regimes. You can consider Shufflecake a "spiritual successor" of tools such as TrueCrypt and VeraCrypt, but vastly improved: it comes with a formal cryptographic security proof, it supports any filesystem of choice, and can concurrently manage multiple independent nested volumes per device, so to make deniability of the existence of these partitions really plausible. In this talk we will present the results of a very active 2025 year in development, which brought important features, massive performance boosts, contributions by our growing community, and we will present the roadmap to the Holy Grail of plausible deniability: A fully hidden Shufflecake OS.

[1] Shufflecake website

Author/Presenter:

  • Tommaso Gagliardoni (Horizen Labs) [presenter]

    Tommaso obtained a PhD at the Technical University of Darmstadt, Germany, with a dissertation on the quantum security of cryptographic primitives. He was postdoctoral researcher at IBM Research Zurich, and cryptography tech lead at Kudelski Security, before joining Horizen Labs in 2025, where he is currently leading the Cryptography Research Team. Tommaso is a member and co-founder of the national cryptography association De Componendis Cifris. He is known, among other achievements, for his collaborations in solving the longstanding problem of adaptive quantum authentication and breaking the security of ISO-standard smart card protocol PLAID. He collaborated with the World Economic Forum, NIST, and other official agencies in the context of international treaties, development programs, and standardization processes on emerging technologies. Additionally, he has a background in privacy hacktivism, investigative journalism, and ethical hacking, being main admin of the Shufflecake Project for protecting the data of journalists, whistleblowers, and dissidents.

15:20—16:00 (CEST) coffee break
session on digital identities
16:00—16:20 (CEST)

Abstract

The European Digital Identity (EUDI) Wallet aims to enable secure and user-centric authentication, with eIDAS 2.0 requiring privacy by design, selective disclosure, and unlinkability across transactions. Current solutions rely on traditional signature schemes such as ECDSA, and achieve only limited unlinkability under strong trust assumptions and incur substantial deployment overhead, due to the issuance of one-time credentials. Anonymous credentials provide stronger security and privacy guarantees as they come with built-in multi-show unlinkability. However, credentials alone do not guarantee non-transferability, which is typically achieved through device binding via secure elements (SE), and by binding each presentation to the device that contains the SE. While academic solutions for that problem exist, they assume non-standard cryptographic capabilities from the SE, whereas deployed hardware supports only legacy algorithms such as ECDSA. Bridging these two worlds would enable the practical adoption of advances achieved through years of research on anonymous credentials, without requiring updates to user hardware. In this talk, we examine the technical challenges of closing this gap and propose several ways to overcome them, based on our work [1]. We present multiple approaches with a broad range of trade-offs, from simplicity of implementation and standardization to computational efficiency.

[1] Lehmann, Sidorenko, Zacharakis. Vision: A Modular Framework for Anonymous Credential Systems. SSR 2025.

Authors/Presenters:

  • Andrea Flamini (Hasso Plattner Institute, University of Potsdam)
  • Anja Lehmann (Hasso Plattner Institute, University of Potsdam)
  • Andrey Sidorenko (Hasso Plattner Institute, University of Potsdam)
  • Alexandros Zacharakis (Hasso Plattner Institute, University of Potsdam) [presenter]

    Alexandros completed his PhD in 2022 at Pompeu Fabra University in Barcelona under the supervision of Vanesa Daza and Carla Rafols with his research focusing on trade-offs in the area of Succinct Arguments of Knowledge (SNARKs). He has also worked as a Cryptography Engineer in the industry, mainly working on research, development and implementation of Zero Knowledge Proofs. He is currently a Postdoc at Cybersecurity - Identity Management group at Hasso Plattner Institute / University of Potsdam working on Zero Knowledge Proofs and Anonymous Credentials in the EUDI Wallet project.

16:20—16:50 (CEST)

Abstract

The European Digital Identity Framework (EUDIF) regulation [2], which entered into force in May 2024, requires that each Member State of the EU offer a digital wallet adhering to the requirements outlined in the regulation by 2026. From a functionality perspective, the core purpose of the EUDIF is to provide individuals with a digital means to identify and authenticate themselves, but also to enable them to store and show authenticated attributes well beyond traditional identity-related information. The vision is that attributes stored in the user's EUDIF wallet will serve as a basis to authorize access to online and offline services. Proposed use cases for the EUDIF include digitalized driving licences, digitalized identities for accessing public and banking services, storing and sharing of travel documents, age verification, and more.

The eIDAS2.0 regulation mandates support for pseudonyms, selective disclosure, and unlinkable authentications. Following feedback from cryptographers on eIDAS2.0 [1], the development of the EUDIF shifted towards a system based on anonymous credentials. This is a celebrated move by many, as it is believed to enable the safe and privacy-preserving deployment of the EUDIF.

In this talk, we take a step back and reconsider whether the addition of cryptographic tools is sufficient to mitigate the broader impact of the proposed sweeping system. We abstract away from specific implementations and use cases, and formalize a model of the EUDIF. Its syntax and operation is expressive enough to capture all currently proposed use cases, and to reason formally about privacy properties thereof. Our analysis then considers privacy through a harms-based lens. We highlight for the EUDIF, (1) the fundamental harms stemming from the minimal leakage of the system's functionality, (2) the harms stemming from its digital nature, and (3) the harms stemming from particular use cases. For the latter, we discuss two extreme use cases: on one hand, use cases requiring complete identities glean no benefits from selective disclosure and other privacy properties of anonymous credentials; on the other end of the spectrum, age verification appears to be an ideal application for anonymous credentials, but still introduces greater capabilities for surveillance, censorship, and discrimination across the Internet.

[1] Baum, Blazy, Camenisch, Hoepman, Lee, Lehmann, Lysyanskaya, Mayrhofer, Montgomery, Nguyen, Preneel, shelat, Slamanig, Tessaro, Thomsen, and Troncoso. Cryptographers' feedback on the EU digital identity's ARF. Technical report, 2024.

[2] European Parliament and Council of the European Union. Regulation (EU) 2024/1183 of the European Parliament and of the Council of 11 April 2024 amending Regulation (EU) no 910/2014 as regards establishing the European Digital Identity Framework. Official Journal of the European Union 2024/1183, 30 April 2024.

Authors/Presenters:

  • Sylvain Chatel (CISPA)
  • Wouter Lueks (CISPA)
  • Mathilde Raynal (EPFL)
  • Theresa Stadler (Swiss Data Science Center)
  • Carmela Troncoso (MPI-SP)
  • Christian Knabenhans (EPFL) [presenter]

    Christian Knabenhans is a doctoral student at EPFL, where he works on lattice-based zero-knowledge and succinct arguments, as well as on applying privacy-enhancing cryptography to real-world protocols for at-risk populations (humanitarian aid recipients, NGOs, investigative journalists). His work has appeared at top-tier conferences (USENIX, CCS, PETS) and he regularly gives talks at venues fostering dialogue between cryptographers and non-cryptographers (RWC, ZKProof, FHE.org).

  • Shannon Veitch (ETH Zurich) [presenter]

    Shannon Veitch is a doctoral student in the Applied Cryptography Group at ETH Zurich. Prior to that, she completed her Masters in the CrySP lab at the University of Waterloo. Her research focuses on improving the cryptographic anonymity guarantees of real-world systems, including censorship resistant protocols and whistleblowing tools. She has presented her work at several academic conferences (CCS, RWC, PETS), and to a broader audience at IETF 121 (CFRG) and the NIST Workshop on Guidance for KEMs.

16:50—17:30 (CEST)

Panelists: TBD

timeline

date and location

Date: Sunday, May 10, 2026

Location: Città Universitaria (University Campus) of Sapienza University of Rome in Rome, Italy.

Room information will be added at a later time.

registration

All participants (including speakers) have to register for CAW over the Eurocrypt 2026 registration by selecting CAW under “affiliated events”. It is possible to only register for workshops, or workshops and the conference.

remote participation

This year, we provide the option to participate remotely at our workshop to make it accessible to the members of our community that cannot or prefer not to travel to Madrid.

Registration is free. Please fill out this Google form before May 8 to receive the Zoom link.

The remote option will be provided on a best effort basis, but we aim to provide good video and audio quality, as well as the opportunity to ask questions.

recordings of CAW 2025

For a preview of what to expect, you can rewatch the recordings of some CAW 2025 talks:

organizers

Matilda Backendal
Università della Svizzera italiana (USI)
Miro Haller
UC San Diego
Laura Hetz
ETH Zurich
Matteo Scarlata
ETH Zurich
Kien Tuong Truong
ETH Zurich

sponsors

ZISC logo

We thank ZISC for contributing some funding for speakers and student stipends.

If you would also like to support us, please contact us by email.