RWC 2025

March 26–28, 2025

Sofia, Bulgaria

Accepted Papers

  1. Deploying TLS Oracles Using Interactive ZK

    Xiang Xie

  2. Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware

    Jules Drean, Fisher Jepsen, G. Edward Suh, Srini Devadas, Aamer Jaleel, Gururaj Saileshwar

  3. A Privacy-Preserving Aid Distribution System with Assessment Capabilities; Or, a Case Study on Threat Modelling and System Design

    Christian Knabenhans, Lucy Qin, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso

  4. Anonymous credentials from ECDSA

    Matteo Frigo, abhi shelat

  5. NOPE: Strengthening Domain Authentication with Succinct Proofs

    Zachary DeStefano, Jeff J. Ma, Joseph Bonneau, Michael Walfish

  6. Flock: A Framework for Deploying On-Demand Distributed Trust

    Darya Kaviani, Sijun Tan, Pravein Govindan Kannan, Raluca Ada Popa

  7. Stealing Cryptographic Keys with Weird Gates

    Eyal Ronen, Chitchanok Chuengsatiansup, Yuval Yarom

  8. Is Your Bluetooth Chip Leaking Secrets via RF Signals?

    Yanning Ji, Elena Dubrova, Ruize Wang

  9. Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy

    Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch

  10. How to Properly Open Source Code: Lessons Learned from the Linux Foundation

    Hart Montgomery

  11. I know what your compiler did: Optimization Effects on Power Side-Channel Leakage for RISC-V

    Asmita Adhikary, Abraham J. Basurto Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, Eloi Sanfelix Gonzalez

  12. Cache Timing Leakages in Zero-Knowledge Protocols

    Shibam Mukherjee, Christian Rechberger, Markus Schofnegger

  13. Shaking up authenticated encryption

    Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, Ronny Van Keer

  14. Field Experiments on Post-Quantum DNSSEC

    Jason Goertzen, Carlos Aguilar Melchor, Shumon Huque, Peter Thomassen, Nils Wisiol

  15. Toward revocation checking that works

    John Schanck

  16. Blast-RADIUS: breaking enterprise network authentication

    Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, Adam Suhl

  17. What Happened to the ZK Dream?

    Carmit Hazay, Tarik Riviere, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang

  18. Randomness beacons in theory and practice

    Joseph Bonneau

  19. Analyzing Chat Encryption in Group Messaging Applications

    Joseph Jaeger, Akshaya Kumar, Igors Stepanovs

  20. Apple’s Real World Deployment of Homomorphic Encryption at Scale

    Rehan Rishi, Haris Mughees, Fabian Boemer, Karl Tarbe, Nicholas Genise, Akshay Wadia, Ruiyu Zhu

  21. The Triple Ratchet Protocol: A Bandwidth Efficient Hybrid-Secure Signal Protocol

    Shuichi Katsumata, Benedikt Auerbach, Yevgeniy Dodis, Daniel Jost, Thomas Prest, Rolfe Schmidt

  22. Auditing Key Transparency

    Mari Galicer, Kevin Lewi, Thibault Meunier

  23. Kemeleon: Elligator-like Obfuscation for Post-Quantum Cryptography

    Felix Günther, Michael Rosenberg, Douglas Stebila, Shannon Veitch

  24. Using Formally Verified Post-Quantum Algorithms at Scale

    Thyla van der Merwe, Karthikeyan Bhargavan, Lucas Franceschino, Franziskus Kiefer, Andres Erbsen

  25. EU Digital Identity and Anonymous Credentials - A Happy End?

    Anja Lehmann

  26. EUCLEAK

    Thomas Roche

  27. No More Guesswork: Ready-to-Use Distributed Key Generation

    Jonas Nick, Tim Ruffing

  28. zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials

    Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrom, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang

  29. Mesh Messaging for Large-Scale Protests: Cryptography Alone Won't Save Us

    David Inyangson, Sarah Radway, Tushar M. Jois, Nelly Fazio, James Mickens

  30. Breaking and Fixing Length Leakage in Content-Defined Chunking

    Kien Tuong Truong, Matteo Scarlata, Simon Phillipp Merz, Felix Günther, Kenny Paterson

  31. Mind the Gap! Secure File Sharing, from Theory to Practice

    Matilda Backendal, David Balbás, Nicola Dardanis, Miro Haller, Matteo Scarlata

  32. Provable Security for End-to-End Encrypted Cloud Storage

    Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenny Paterson

  33. Deploying MPC in Open Finance: Challenges and Opportunities

    Nidhish Bhimrajka, Yashvanth Kondi, Daniel Noble, Supreeth Varadarajan

  34. D(e)rive with Care: Lessons Learned from Analyzing Real-World Multi-Input Key Derivation Functions

    Matilda Backendal, Sebastian Clermont, Marc Fischlin, Felix Günther, Miro Haller, Matteo Scarlata

  35. Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures

    Gilles Barthe, Marcel Boehme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom

  36. Zero-knowledge Proofs for Legacy Signatures

    Pui Yung Anna Woo, Chad Sharp, Paul Grubbs, Chris Peikert

  37. How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent

    Mallory Knodel, Andrés Fábrega, Daniella Ferrari, Jacob Leiken, Betty Li Hou, Derek Yen, Sam de Alfaro, Kyunghyun Cho, Sunoo Park

  38. Stronger Privacy for Existing Credentials

    Christian Paquin, Guru Vamsi Policharla, Greg Zaverucha

  39. Exploiting Vulnerable Implementations of ZK-based Cryptographic Schemes Used in the Ethereum Ecosystem

    Oana Ciobotaru, Maxim Peter, Vesselin Velichkov, Sam Wong, Nikesh Nazareth

  40. Post-quantum Cryptographic Analysis of SSH

    Benjamin Benčina, Benjamin Dowling, Varun Maram, Keita Xagawa

  41. Attacking and Improving the Tor Directory Protocol

    Zhongtang Luo, Adithya Bhat, Kartik Nayak, Aniket Kate

  42. Formally analyzing a cryptographic protocol standard (or: how MLS kept this PhD student busy for three years)

    Théophile Wallez

  43. QRYPT: End-to-End Encrypted Audio Calls via Blind Audio Mixing

    Emad Heydari Beni, Lode Hoste