Affiliated Events
Registration to the affiliated events is now closed as capacity has been reached.
Registration for the affiliated events does not include access to the main conference’s welcome reception on Sunday, May 4.
The affiliated events will take place on May 3-4, 2025 at Facultad de Ciencias Matemáticas, Universidad Complutense de Madrid (UCM) which is located at Plaza de Ciencias 3, Ciudad Universitaria. 28040 - Madrid (España). Every participant must register (including attendees, speakers, organizers) through the Eurocrypt 2025 registration.
List of affiliated events
The schedule of the events on Saturday or Sunday may still be subject to changes.
Saturday
Organizers
Thorben Moos (Universite Catholique de Louvain, Belgium) Shahram Rasoozladeh (Ruhr University Bochum, Germany)
Abstract
In recent years, the demand for cryptographic primitives with minimum execution time has greatly increased. Memory encryption, secure cache architectures and pointer authentication are among the most commonly cited use cases for cryptographic algorithms that feature a low latency in hardware, i.e., a short period between providing inputs and receiving outputs. While execution speed is clearly the main criterion for such designs, other factors such as area, power and energy consumption have to be considered as well. Arguably the most challenging aspect of designing dedicated low-latency primitives is that there is very little room for error in the security analysis. Considerable safety margins to account for uncertainties or potential improvements of attacks are hardly affordable, bold security claims and careful public scrutiny are needed. Hence, the concrete trade-offs between hardware implementation parameters and cryptanalytic properties need to be well understood to find designs with optimal performance for a desired security level. To advance this emerging research field, the LLE workshop will provide an international forum for researchers to exchange ideas, explore new directions, and address key challenges.
Organizers
Stjepan Picek (Radboud University), Lejla Batina (Radboud University), Luca Mariot (University of Twente)
Abstract
The intersection of artificial intelligence (AI) and security has gained significant attention, driven by the need for secure solutions that deploy AI. Cryptography, in particular, stands as a notable example of the benefits of AI integration. AI techniques and methods are already being applied to address challenges in cryptography, such as improving cryptanalysis and physical attacks and relevant countermeasures. Our goal is to bring together experts from academia and industry, each with a unique perspective on cryptography and AI, to foster knowledge exchange and collaborative innovation. We are particularly interested in exploring how techniques can be transferred across different cryptographic applications and in enhancing AI security mechanisms.
Organizers
Chris Brzuska (Aalto University), Sabine Oechsner (Vrije Universiteit Amsterdam)
Abstract
Cryptographic reductions, simulations and security arguments are an important part of evaluating the (in)security of cryptographic algorithms and designs before they are realised—in standards, software and hardware. Despite the rich landscape of techniques used for reasoning about the security of primitives, constructions and interactive protocols, the cryptographic security proofs themselves are often seen as “attached” to the objects they relate to, and rarely studied as independent objects.
ProTeCS celebrates cryptographic proofs as independent objects of study and discussing the techniques that bring such proofs to life in practice, further fostering the growth of the community of proof nerds. In particular, we will focus on discussing coming challenges for cryptographic proof writers, from quantum reductions and simulations, to the need for end-to-end proof techniques that apply all the way from core primitives to high-level security requirements.
In addition to invited talks, we invite the community to submit short presentations.
Organizers
Maria Corte-Real Santos (UCL), Jonathan Komada Eriksen (COSIC, KU Leuven)
Abstract
Isogeny-based cryptography is a promising research direction in post-quantum cryptography, which has particularly seen a large amount of growth and innovation in recent years since the attack against SIDH/SIKE. The Isogeny Club: Brainstorm Session aims to provide fertile soil for fresh ideas to grow into proper research, as well as give young researchers a direct opportunity to come in contact with, and work with, more experienced researchers in the field. This is done by sharing research ideas and working together on these ideas over two days.
Organizers
Angela Barbero (Universidad de Valladolid), Øyvind Ytrehus (Simula UiB and University of Bergen)
Abstract
Code-based cryptography is the study of cryptographic systems for which the security relies on hard coding-theoretic problems, pioneered by McEliece and Niederreiter almost fifty years ago. An important line of research within code-based cryptography is focused on the design and analysis of cryptographic schemes that will resist attacks that employ large quantum computers. In 2017, the National Institute of Standards and Technology (NIST) initialized a standardization process for post-quantum cryptography for key encapsulation mechanisms and digital signatures. Although the first standard proposals are emerging from this process, it is continuing, and schemes based on code-based cryptography remain viable candidates for future standards. Beyond post-quantum cryptography, coding theoretic approaches have also been proposed for other cryptographic purposes, including but not limited to coding for oblivious transfer protocols and coding for combining information theoretic security and computational security on a wiretap channel. The workshop aims at bringing together the existing community as well as young (and older) researchers approaching this research area for the first time, informing researchers across the community about the newest results in the field, and fostering further collaborations.
Organizers
Jesús Diaz Vico (Input Output) David Arroyo Guardeño (CSIC) Isaac Agudo (NICS Lab)
Abstract
Over the last decade, projects working in the area of blockchains and distributed ledger technology (DLT) have developed many cryptographic protocols to market readiness which had existed almost exclusively in the academic research domain before. Quite arguably, significant recent advances in areas like non-interactive zero-knowledge proofs or threshold cryptography are directly or indirectly driven by the application-level requirements (and sometimes funding) coming from that space. The DLT space itself is, however, fractured, with different DLT ecosystems based on different philosophies and assumptions, and projects solving similar problems in very different ways. The Workshop on Cryptographic Tools for Blockchain is a one-day event affiliated with Eurocrypt 2025 and aims to bring researchers working on cryptographic problems in different DLT ecosystems and related to different platforms together to discuss the latest approaches and results. The workshop will focus on submissions that cover cryptographic tools for DLTs, which includes but is not limited to the areas of non-interactive zero-knowledge proofs, threshold cryptography, identity, and multi-party computation, as well as the use of such cryptographic tools in DLT protocols.
Organizers
Dmitry Khovratovich, George Kadianakis, Antonio Sanso (Ethereum Foundation)
Abstract
This event brings together researchers to explore Algebraic Hash Functions, with a focus on Poseidon’s role in Ethereum. The first day features expert talks and idea pitches, leading to collaborative research groups. On the second day, teams refine their findings and present their insights. The workshop aims to advance understanding and identify potential vulnerabilities in these cryptographic systems.
Sunday
Organizers
Maria Corte-Real Santos (UCL), Jonathan Komada Eriksen (COSIC, KU Leuven)
Abstract
Isogeny-based cryptography is a promising research direction in post-quantum cryptography, which has particularly seen a large amount of growth and innovation in recent years since the attack against SIDH/SIKE. The Isogeny Club: Brainstorm Session aims to provide fertile soil for fresh ideas to grow into proper research, as well as give young researchers a direct opportunity to come in contact with, and work with, more experienced researchers in the field. This is done by sharing research ideas and working together on these ideas over two days.
Organizers
Angela Barbero (Universidad de Valladolid), Øyvind Ytrehus (Simula UiB and University of Bergen)
Abstract
Code-based cryptography is the study of cryptographic systems for which the security relies on hard coding-theoretic problems, pioneered by McEliece and Niederreiter almost fifty years ago. An important line of research within code-based cryptography is focused on the design and analysis of cryptographic schemes that will resist attacks that employ large quantum computers. In 2017, the National Institute of Standards and Technology (NIST) initialized a standardization process for post-quantum cryptography for key encapsulation mechanisms and digital signatures. Although the first standard proposals are emerging from this process, it is continuing, and schemes based on code-based cryptography remain viable candidates for future standards. Beyond post-quantum cryptography, coding theoretic approaches have also been proposed for other cryptographic purposes, including but not limited to coding for oblivious transfer protocols and coding for combining information theoretic security and computational security on a wiretap channel. The workshop aims at bringing together the existing community as well as young (and older) researchers approaching this research area for the first time, informing researchers across the community about the newest results in the field, and fostering further collaborations.
Organizers
Miro Haller (UCSD), Matilda Backendal (ETH Zurich), Laura Hetz (ETH Zurich), Matteo Scarlata (ETH Zurich)
Abstract
The Cryptographic Applications Workshop (CAW; the constructive twin of WAC) focuses on the construction and analysis of cryptography built for practice. Inspired by the Real World Crypto Symposium, it aims to provide a forum for cryptographers in academia and industry to exchange ideas and insights, bridging the gap between research and real-world applications. The main themes of CAW are
- formalizing the security of deployed cryptography,
- constructing cryptographic primitives and systems for practice, and
- the industry perspective on deployment and maintenance of cryptography.
The workshop consisted of a mixture of invited and contributed talks on recent contributions and developments in the field of applied cryptography.
Organizers
Deirdre Connolly (SandboxAQ), Philipp Haselwarter (Aarhus University), Sabine Oechsner (Vrije Universiteit Amsterdam)
Abstract
Interested in this formal verification thing everyone talks about, but no clue where to start? EasyCrypt, Proverif, Lean, aren't they all the same? Why are there so many tools when one should be enough? CAPS will give you an overview of the formal verification tool landscape for cryptographic security, for primitives and protocols, and from symbolic to computational security and everything in between.
Organizers
Stelvio Cimato (University of Milan), Joan Daemen (Radboud University), Silvia Mella (Radboud University), Gilles Van Assche (STMicroelectronics).
Abstract
In the last decade it has become clear that permutation-based cryptography is highly competitive in terms of performance and resource usage when compared to classical block ciphers and their modes.
The goal of PBC workshop is to bring together academics and industry experts to discuss recent advances in this research area, as well as provide an introduction to anyone interested in discovering more about this field.
The workshop will address diverse aspects of permutation-based cryptography, like cryptanalysis, modes, protocols, and implementations in a sequence of invited and contributed talks.
Organizers
Dmitry Khovratovich, George Kadianakis, Antonio Sanso (Ethereum Foundation)
Abstract
This event brings together researchers to explore Algebraic Hash Functions, with a focus on Poseidon’s role in Ethereum. The first day features expert talks and idea pitches, leading to collaborative research groups. On the second day, teams refine their findings and present their insights. The workshop aims to advance understanding and identify potential vulnerabilities in these cryptographic systems.
Organizers
Pino Caballero-Gil (University of la Laguna) Jintai Ding (University of Cincinnati) Paco Martin-Fernandez (IBM Research)
Abstract
This interdisciplinary workshop focuses on the critical and timely topic of Quantum-Resistant Cryptography, aiming to bring together researchers, practitioners and policymakers to discuss advances, challenges and strategies in the design, theoretical analysis and practical implementation of cryptographic systems resilient to quantum adversaries. Thus, this workshop serves as a platform to exchange knowledge on Quantum Cryptography, Post-Quantum Cryptography and Pre-Quantum Cryptography resistant to quantum computing.
Organizers
Nico Döttling (CISPA) Sanjam Garg (University of Berkeley) Giulio Malavolta (Bocconi University)
Abstract
Laconic cryptography is an emerging paradigm that enables secure computation between potentially many senders and a ‘‘laconic’’ receiver. Abstractly, laconic cryptography can be thought of as a reverse delegation paradigm, where the party that does the computation is also the one that obtains the result. This approach enabled several new results such as identity-based encryption from new assumptions (CDH), rate-1 oblivious transfer, laconic function evaluation, and much more. In addition, techniques from laconic cryptography have been useful to build registration-based encryption (RBE), a promising proposal to overcome the key escrow problem in identity-based encryption.Over the past few years, this field has seen substantial growth, with numerous new primitives and applications being introduced. Recent advancements have addressed the efficiency limitations of earlier constructions, opening the door for schemes that are tantalizingly close to practical. The goal of this workshop is to bring together a broad spectrum of distinguished senior researchers as well as young rising stars, to disseminated the latest trends and identify new and exciting directions in the field. Specifically we will (i) cover foundational aspects of laconic cryptography, (ii) survey recent developments in the area, and (iii) identify outstanding challenges that remain to make laconic primitives truly practical.
Program
- Registration: 8:30-17:00 (Saturday), 8:30-14:00 (Sunday)
- Sessions: 9:30-17:45 (Saturday), 9:00-17:15 (Sunday)
- Coffee-breaks: 10:30-11:00 and 15:15-15:45
- Lunch: 13:00-14:15
An overview of the tentative program for all affiliated events can be found here (PDF). Please see the individual events' websites for further information and updates
The affiliated events venue
The venue is near the Ciudad Universitaria (line 6) metro stop. See here for a map and directions.
Location: Plaza de Ciencias 3, Ciudad Universitaria. 28040 - Madrid (Spain)
By underground: Line 6, Stop Ciudad Universitaria -- 11 minutes walking (PDF map)
By bus: [Note that buses are less frequent during weekends]
- Stop 1693 Paraninfo-Matemáticas:
- Line 82 (from Moncloa)
- Stop 3274 Ciencias Biológicas y Geológicas:
- Line 132 (from Hospital la Paz)
- Stop 3273 Ciencias Biológicas y Geológicas:
- Line 132 (from Moncloa)

See the map for the conference venue (Google Maps link) and affiliated events (Google Maps link) below.





















