Real World Crypto Symposium aims to bring together cryptography researchers with developers implementing cryptography in real-world systems. The conference goal is to strengthen the dialogue between these two communities. Topics covered focus on uses of cryptography in real-world environments such as the Internet, the cloud, and embedded devices.
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations Eyal Ronen Robert Gillham Daniel Genkin Adi Shamir David Wong
Deco: Liberating Web Data Using Decentralized Oracles for TLS Fan Zhang Sai Krishna Deepak Maram Harjasleen Malvai Steven Goldfeder Ari Juels
Attacks only get better: The case of OCB2 Tetsu Iwata
All on Deck! Joan Daemen Seth Hoffert Michaël Peeters Gilles Van Assche Ronny Van Keer
The Evolving Crypto War Jennifer Granick
Weaknesses in the Moscow internet voting system Pierrick Gaudry
Knights and Knaves Run Elections (Abstract) Sarah Jamie Lewis Olivier Pereira Vanessa Teague
Everybody be cool, this is a robbery! Jean-Baptiste Bédrune
TPM-Fail: TPM meets Timing and Lattice Attacks Daniel Moghimi Berk Sunar Thomas Eisenbarth Nadia Heninger
Protecting Memory Contents on ARM Cores Roberto Avanzi Subhadeep Banik Orr Dunkelman Hector Montaner Prakash Ramrakhyani Francesco Regazzoni Andreas Sandberg
General Purpose Frameworks for Secure Multiparty Computation Marcella Hastings
Detecting Money Laundering Activities via Secure Multi-PartyComputation for Structural Similarities in Flow Networks Nicolas Gama Mariya Georgieva Dimitar Jetchev Kevin McCarthy Jakob Odersky Alexander Petric Abson S. Tang
Too Much Crypto Jean-Philippe Aumasson
The First Chosen-Prefix Collision on SHA-1 Gaëtan Leurent Thomas Peyrin
Adept Secret Sharing Mihir Bellare Wei Dai Phillip Rogaway
Privacy-preserving telemetry in Firefox (14:00-14:35) Henry Corrigan-Gibbs
Pass-as-you-go: Widespread Deployment of Direct Anonymous Attestation (14:35-14:50) Nicolas Desmoulins Aïda Diop Jacques Traoré
Pseudorandom Black Swans: Cache Attacks on CTR DRBG Shaanan Cohney Andrew Kwong Shahar Paz Daniel Genkin Nadia Heninger Eyal Ronen Yuval Yarom
Cryptographic Software in a Post-Spectre World Chandler Carruth
CRLite: Where Industry and Academia Collide Thyla van der Merwe
Are certificate thumbprints unique? Greg Zaverucha Dan Shumow
Implementing a Crypto Services Strategy at ABN AMRO Bank Christiane Peters Tiago Teles
Rolling the DiSE: Taking Threshold Encryption to Enterprise Shashank Agrawal Mihai Christodorescu Payman Mohassel Pratyay Mukherjee Peter Rindal Gaven Watson
Model-Checking 5G Security David Basin
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd Mathy Vanhoef Eyal Ronen
Navigation Message Authentication for the Galileo Open Service Tomer Ashur Dan Burkey David Calle Simon Cancela Ignacio Fernandez Oscar Pozzobon Vincent Rijmen Carlo Sarto Gonzalo Seco-Granados Javier Simon Paul Walker
E2EE for Messenger: goals, plans and thinking Jon Millican
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging Joel Alwen Sandro Coretti Yevgeniy Dodis Yiannis Tselekounis
Protecting accounts from credential stuffing with password breach alerting Kevin Yeo
Protocols for Checking Compromised Credentials Lucy Li Bijeeta Pal Junade Ali Nick Sullivan Rahul Chatterjee Thomas Ristenpart
Deep Learning Security Nudges Towards Stronger Cryptography Felix Fischer
CyrpTen: a Machine Learning focused framework for secure computing Shubho Sengupta
Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector Oliver Masters Hamish Hunt Enrico Steffinlongo Jack Crawford Flavio Bergamaschi
Challenges and Cryptographic Solutions with Payment-Channel Networks Pedro Moreno-Sanchez
The Marvellous Universe of Arithmetization-Oriented Primitives Abdelrahaman Aly Tomer Ashur Eli Ben-Sasson Siemen Dhooghe Alan Szepieniec
One out of billion within one second: ZK-friendly hash functions for Merkle tree proof Dmitry Khovratovich Lorenzo Grassi Christian Rechberger Daniel Kales Lovesh Harshandani Arnab Roy Markus Schofnegger