| Date: | 18.-19.02.2026 |
| Duration: | |
| Location: |
Fraunhofer SIT
Rheinstraße 75 Darmstadt |
| Day 1 (Wed, Feb 18th, 2026) | |
| 09:30 | Registration and Coffee |
| 10:00 | |
|
Gisela Meister
|
Opening
|
| Block 1 - CRA | |
| 10:10 | |
|
Vangelis Gazis (angefragt)
Huawei
|
Wearables CRA
|
| 10:40 | |
|
Ivan Plajh
CENELEC
|
Secure Element / Smartcards / CRA
|
| 11:10 | Kaffeepause (20 min) |
| 11:30 | |
|
Cord Bartels
Expert CEN/CLC JTC13
|
A Risk-Based Approach to Sectoral Cybersecurity: Guidance for the application of EN 18037 in support of the Cyber Resilience Act CRA
EN 18037, which was published in 2025, specifies a methodology for conducting risk and security analysis in complex multi-stakeholder ICT systems. This includes the identification of appropriate security and assurance level requirements to ICT products based on risks associated with their intended use in a dedicated sectoral system context. The presentation shows how this methodology can be used in support of the CRA, particularly in supporting product manufacturers and standard development organizations in determining risks that may be caused by ICT security incidents associated with specific products and in defining appropriate security requirements. |
| 12:00 | |
|
Jens Oberender
SRC Security Research & Consulting GmbH
|
Defining the scope for high security assurance in Cloud-based products
Traditional security assurance was built for static environments like smartcards. Today’s reality shatters that model: How do you certify a product when critical security functions (TSF) rely on external parties, e.g. Cloud Service Providers to Cloud applications? We analyze the friction between TOE boundaries and infrastructure, mapping security contributions across ownership lines. We discuss modeling EAL4 security functions when vendors lack source-code access, aiming to maximize assurance despite "black-box" dependencies. Our approach provides a roadmap for navigating shared responsibility in modern certification. |
| 12:30 | Mittagspause (60 min) |
| 13:30 | |
|
Thomas Gilles
BSI / DI 22
Ralf Spenneberg
Open Source Security GmbH
|
ConformXpert - Assessment Tool ETSI EN 303 645
ETSI EN 303 645 is a world class standard for the security of Consumer IoT products. The new tool conformXpert allows to easily perform conformance assessments based on ETSI EN 303 645 with the test methodology of ETSI TS 103 701. The tool e.g., enables the simple creation of an Implementation Conformance Statements (ICS) and automatically generates the necessary IXITs for requesting documentation. conformXpert helps you complete the IXITs with guidance. The CRA product requirements will be closely aligned with EN 303 645. Therefore, you can use the tool to prepare yourself for the CRA. |
| Block 2 - Wallets | |
| 14:00 | |
|
Wijnand Machielse
SRC Security Research & Consulting GmbH
|
UPDATE zu: Connecting the dots: How Harmonised Berlin Group Open Finance Standards are empowering EU Digital Identity Wallets with payments and account information services
Europe’s payments ecosystem, successfully initiated by PSD2 Open Banking, is now constrained by increasing fragmentation caused by proprietary, scheme-specific APIs and channel-dependent integrations. This complexity drives redundant development, higher costs, technical debt, and slower time-to-market, while limiting scalability, pan-European reach, innovation, and effective supervision. A new wave of EU regulation (PSD3/PSR, FIDA, eIDAS 2.0, Digital Euro) provides a unique opportunity to move beyond Open Banking towards a truly harmonised Open Finance environment. This presentation introduces a coherent architectural approach: a Harmonised Universal API Stack based on a two-pillar model combining a shared pan-European Common Core API layer with scheme- or region-specific extensions. The model demonstrates how harmonised data models, semantics, security, and channel-independent integration significantly reduce integration effort and lifecycle complexity, while enabling consistent service exposure across web, mobile, ERP, and treasury systems. The session outlines current ecosystem gaps, core design principles, harmonised capabilities (e.g., routing, onboarding, certification, alias services, liability), and the seamless integration of AI-driven agents. It concludes with a vision of a resilient European payments fabric where stakeholders compete on service value rather than integration friction. |
| 14:30 | Kaffeepause (20 min) |
| 14:50 | |
|
Andreas Plies
Authada GmbH
|
EUDI-Wallet – Migration as a Path, not a Switch: Transitioning from HSM-Based Concepts to Decentralised Secure Hardware Elements
|
| 15:20 | |
|
Mirko Mollik
SPRIND
|
EUDI-Wallet Status + Roadmap
The EUDI Wallet will become a core digital trust infrastructure in Europe, enabling secure identification, verified credentials, and qualified signatures. This talk outlines the current status of the German implementation, key architectural and security decisions, and lessons learned from prototyping and ecosystem onboarding. It concludes with a roadmap toward the 2026 rollout and the first wave of relying parties. |
| 15:50 | Kaffeepause (20 min) |
| Block 3 - Application | |
| 16:10 | |
|
Karsten Kochan
gematik GmbH
|
Identification mechanisms for the German healthcare system
In the German healthcare system, all identities—whether card-based or fully digital—require the identification of natural persons. The General Data Protection Regulation (GDPR) imposes stringent trust requirements, which has led to a restriction in the variety of identification systems that have been approved for integration within the German healthcare system. The recent approval of a video-based hybrid identification system for utilization in the regulated healthcare sector marks the conclusion of a three-year period during which card-based remote identification systems were the sole permitted option (next to on-site-procedures). An overview of the current situation regarding identifications in the healthcare sector. |
| 16:40 | |
|
Olaf Henniger
Fraunhofer IGD
|
Application of new biometric data interchange formats in machine-readable travel documents
The ISO/IEC 39794 series of standards specifies biometric data interchange formats based on ASN.1 (Abstract Syntax Notation One) and its the Distinguished Encoding Rules, yielding binary tag-length-value encodings and enabling future extensions. To make the new data formats adaptable to different purposes, only the core data elements are mandatory. Data elements that can be useful for some purpose but are not always necessary are optional. Application profiles may declare optional data elements as mandatory or deprecated for a par-ticular purpose, e.g. for storage in machine-readable travel documents (MRTDs). According to ICAO’s timeline, from January 2026 onwards, MRTD inspection systems must be ready to handle the new data for-mats because newly issued MRTDs may use them. From 2030 on-wards, all newly issued MRTDs must use the new data formats. In preparation of the roll-out, application profiles for face and fingerprint image data in MRTDs have been developed, and prototypes of MRTDs and MRTD inspection systems from multiple vendors have been tested multiple times for interoperability. However, some choices are still left to the national MRTD issuers. To assist in deciding which options to support when storing biometric data in MRTDs, this paper summarizes the application profiles for face and fingerprint image data and discusses the remaining options. |
| 17:10 | |
|
Tim Ohlendorf
IBM Consulting
|
An Introduction to Confidential Computing
Confidential Computing secures data-in-use by leveraging hardware-based Trusted Execution Environments (TEEs) and Remote Attestation. This session explores how the technology reduces the trust gap in cloud and edge environments, covering TEE architecture principles, attestation flows, and secure secret provisioning patterns. Real-world use cases and practical implementation considerations are examined. The presentation provides security professionals with foundational knowledge for understanding and building robust Confidential Computing solutions. |
| 17:40 | Break /Hotel-Check-in |
| 19:00 | Dinner |
| Day 2 (Thu, Feb 19th, 2026) | |
| 09:00 | Opening |
| Block 4 - Side Channel/Cryptography | |
| 09:10 | |
|
Peter Günther
Utimaco IS GmbH
Volker Krummel
Utimaco IS GmbH
|
Distributed stateful hash-based signatures for applications on constrained devices
Stateful hash-based signatures (SHBSs) are an important building block for post-quantum security. For example, for firmware signing only SHBSs fulfill the post quantum regulatory requirements from CNSA and BSI at the same time. On the one hand, SHBSs are based solely on hash functions, have a high maturity, and their signature verification is efficient. On the other hand, securely handling their state is often difficult in practice and signature generation is inefficient. In our presentation, we show how the state can be handled securely in practice and how the signature computation on constraint devices can be supported by the infrastructure. |
| 09:40 | |
|
Lukas Varnhorst
Referat T 11 - Chip-Sicherheit / BSI
|
Side Channel Attacks on a Discount?
Modern eID systems are typically penetration-tested and certified (e.g., under Common Criteria). Yet, they remain deployed for many years, during which new side-channel attacks can emerge, as seen recently with EUCLEAK and "Side Journey into Titan." We ask: as of 2026, are such attacks still limited to well-resourced organizations, or can individuals also perform them? Focusing on advanced electromagnetic (EM) side-channel attacks—commonly assumed to require expensive setups—we show that low-cost equipment alternatives now exist for most components. This suggests that even hobbyists could realistically mount such attacks. |
| 10:10 | Kaffeepause (20 min) |
| 10:30 | |
|
Armin Lunkeit
procilon GmbH
|
Transition to PQC - challenges and approaches
Post‑quantum cryptography (PQC) migration poses significant strategic and operational challenges, as current RSA‑ and EC‑based systems risk becoming vulnerable with the advent of large‑scale quantum computers. Organizations must weigh short‑term mitigation measures against their limited long‑term effectiveness. A sustainable approach requires adopting PQC‑capable infrastructures, which includes redesigning key management architectures, updating chip‑card–based processes, and renewing the public key infrastructure. The transition introduces substantial complexity, particularly regarding certificate renewal cycles, key custodianship models, and the re‑encryption of sensitive archived documents. |
| 11:00 | |
|
Frank Morgner
Bundesdruckerei GmbH
Jan Klaußner
Bundesdruckerei GmbH
|
PQC Migration
Die Post Quantum Support Action (PQCSA) ist ein EU-Projekt, das die Sensibilisierung erhöhen und die Schritte zur Einführung von Post-Quanten-Kryptographie (PQC) unterstützen soll. Dieser Vortrag teilt praxisnahe Erfahrungen aus PQCSA-Workshops und zeigt auf, wie unterschiedliche Communities den Reifegrad und die Vorbereitung auf PQC verstehen und angehen. Wir stellen Lessons Learned aus praktischen Übungen und Diskussionen zu Migrationspfaden vor und legen dabei einen besonderen Fokus auf unsere Arbeit zur Integration von PQC in Identity- und Access-Management-Systeme. Diese Erfahrungen machen sowohl technische als auch organisatorische Herausforderungen sichtbar, die in realen Umgebungen typischerweise auftreten. Abschließend skizzieren wir zentrale Lücken, die wir in der europäischen PQC-Roadmap identifiziert haben, darunter fehlende praxisorientierte Handreichungen, unzureichende Koordination zwischen Standards sowie fehlende Unterstützung für sektorspezifische Übergänge. |
| 11:30 | |
|
Adrian Marotzke
NXP Semiconductors N.V.
|
Post-Quantum Secure Trusted Execution Environment on RISC-V
A Trusted Execution Environment (TEE) is a secure area of the main processor of a connected device that ensures sensitive data is stored, processed, and protected in an isolated and trusted environment. A TEE is a key component to enable secure applications such as identification and payment. However, there are currently no suitable & mature TEE solutions for RISC-V, and current TEEs are also not yet secure against the threat of quantum computers. This talk will present our ongoing research work on enabling post-quantum security for TEEs on RISC-V, based on the open-source RISC-V SoC framework Chipyard and the open-source TEE framework Keystone. This includes algorithm selection, implementation optimization and hardware acceleration. Our results show that a post-quantum secure TEE is feasible for RISC-V, though more work is needed for a mature commercial solution. |
| 12:00 | Mittagspause (60 min) |
| 13:00 | |
|
Johannes Mittmann
BSI / Referat V 31 - Grundlagen kryptographischer Verfahren
|
Linux Random Number Generator and AIS 20/31 Compliance
Since 2012, the BSI has commissioned an ongoing study to document and analyze the Linux random number generator from a security perspective. This presentation will outline the current status of the Linux random number generator and discuss its compliance with the recently updated AIS 20/31 evaluation guidelines. |
| Block 5 - ID | |
| 13:30 | |
|
Arno Fiedler
Nimbus Technologieberatung GmbH
|
Identity- and Trust Service as Regulated Technologies in Europe: who will survive?
Since 2016, a harmonised market for trust services has developed in Europe based on the eIDAS Regulation. Thanks to CEN and ETSI standards, not only are data formats interoperable, but security levels and audit procedures are also comparable. The amendment to the eIDAS Regulation now imposes numerous new NIS/2 requirements on trust service providers, particularly with regard to availability and the supply chain. In addition, PKI software is regulated by the Cyber Resilience Act (CRA), and further new testing requirements are imposed on hardware by the Commission Implementing Regulations (CIR). The presentation will therefore address the question of whether the market for qualified trust services, currently estimated at €400 million per annum, will remain in its current form, especially since signature and identification services will be offered free of charge by government wallet providers from 2026 onwards. |
| 14:00 | Kaffeepause (20 min) |
| 14:20 | |
|
Stefane Mouille
Cabinet Louis Reynaud
|
European standard(s) on essential cybersecurity requirements for identity management systems and privileged access management software and hardware, including authentication and access control readers, including biometric readers
|
| 14:50 | |
|
Florian Domin
secunet Security Networks AG
|
Synthetische Identitäten, Deepfakes und Entscheidungsunterstützung
The talk begins with an introduction to the GanDiff approach, which enables the targeted generation of realistic and consistent facial images—synthetic identities. This technology opens up new possibilities, such as creating legend material for OSINT analysts or reducing bias in AI training datasets. We then present our method for projecting real identities (facial images) into the system in order to work with them further, including use cases such as cold cases through synthetic age progression or the creation of photo lineups to support suspect identification. The talk concludes with a discussion of the risks posed by deepfakes in the context of identities and in general, and presents a deepfake detection solution designed to support decision-making within law enforcement agencies. |
| 15:20 | |
|
Markus Mösenbacher
Infineon Technologies AG
Christian Stengel
Deutsche Telekom Security GmbH
|
Digital ID – EU initiatives and different options to achieve Level of Assurance High
Discover the Future of Digital Identification: EU Initiatives and Pathways to High Assurance Join us for a comprehensive overview of the global shift towards Mobile ID, highlighted by a successful European case study. This presentation delves into the various security options available, including cutting-edge Global Platform solutions. Looking ahead, we'll explore the possibilities of EU-wide interoperability, paving the way for a seamless and secure digital identity ecosystem. |
| 15:50 | Conclusions |
| 16:00 | End |
Deadline for a registration is 08.02.2026. By registering before deadline we charge a reduced fee. We ask you to take this offer to allow best preparation of the seminar. Special conditions may be granted for students and trainees.
| On registration ... | before deadline | after deadline |
|---|---|---|
| registration fee for the workshop | 590,00 € | 640,00 € |
| for owners of a CAST service package | 450,00 € | 500,00 € |
| Public authorities | 250,00 € | 300,00 € |
| Student discount | 100,00 € | 100,00 € |
All prices are incl. 7% VAT
To pay the reduced fee, you should order the CAST service package now.
If you have any questions please contact:
Simone Zimmermann
CAST e.V. Geschäftsstelle
Phone: +49 (0) 6151/869 230
Email: info@castforum.de
Simone Zimmermann
CAST e.V.
Tel.: +49 6151 869-230
Email: simone.zimmermann
cast-forum.de
Please note that we only can accept registrations by this online form and not by our fax number.