The RWC annual conference aims to bring together cryptography researchers with developers implementing cryptography in real-world systems. The main goal of the conference is to strengthen the dialogue between these two communities. Topics covered will focus on uses of cryptography in real-world environments such as the Internet, the cloud, and embedded devices.
Co-hosted by the Columbia University DSI Center for Cybersecurity
Software engineering and OpenSSL is not an oxymoron
Project Wycheproof - Scaling crypto testing
X.509 in Practice (It's worse than you think)
Is Crypto Software Safe Yet?
NSEC5: Provably Preventing DNSSEC Zone Enumeration
Cryptographically Securing the Network Time Protocol
Security assessment of software security: A closer look at white-box cryptographic implementations
NIST's Post-Quantum Cryptography Project
Cryptographic Suite for Algebraic Lattices — CRYSTAL
Practical post-quantum key exchange from both ideal and generic lattices
Supersingular Isogeny Diffie-Hellman
The Strobe protocol framework
FourQ based cryptography for high performance and low power applications
High-Throughput Secure 3PC for Semi-Honest and Malicious Adversaries - Breaking the Billion-Gate per Second Barrier
Secure Multiparty Computation at Google
Privacy-Preserving Classification on Deep Neural Network
Challenges of E2E Encryption in Facebook Messenger
Memories for Your Eyes Only
DMCA
Message Encryption
A Formal Security Analysis of the Signal Messaging Protocol
0-RTT Key Exchange with Full Forward Secrecy
Towards 5G Authenticated Key-Exchange: the security and privacy of the AKA Protocol
Is Password InSecurity Inevitable? Cryptographic Enhancements to Password Protocols
Towards a Theory of Data-Independent Memory Hard Functions
The memory-hardness of Scrypt
Solving the Cloudflare CAPTCHA
The physics of building a quantum computer
Erasing secrets from RAM
Direct Anonymous Attestation and TPM 2.0: Getting Provably-Secure Crypto into the Real-World
DPA Resistance for Real People
What Else is Revealed by Order-Revealing Encryption
Breaking Web Applications Built On Top of Encrypted Data
Building web applications on top of encrypted data
PRNG Failures and TLS Vulnerabilities in the Wild
Concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
Productizing TLS Attacks: The Rupture API
Rethinking Internet-Scale Consensus
Listening to and Silencing the Whispers of Ripple: Study and Solutions for Privacy in IOweYou Credit Networks
Cryptography and Protocols in Hyperledger Fabric
Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies