Conferences  >  Mathematics  >  Cryptography, Blockchain and Information Security

Select a location
ALL COUNTRIES (5)
1
ARES '25 — 20th International Conference on Availability, Reliability and Security
11 Aug 2025 - 14 Aug 2025 • Ghent, Belgium
Organizer:
Ghent University (BE), in collaboration with SBA Research (AT)
Abstract:
The 20th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES highlights the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES emphasizes the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.
Contact:
Phone: [+32 9 264 33 67];     Email: ares@ugent.be
Topics:
Authorization, Authentication, Access Control, Automated Vulnerability Repair, Availability, Confidentiality, Integrity, Botnets and Botnet Monitoring, Cloud Security, Compliance, Certification, Legal aspects related to Security and Privacy, Dependability, Resilience, Digital Forensics, Human Factors in Security and Privacy Identity Management, Incident Response and Prevention, Intrusion Detection, Fraud Detection, Machine Learning for Security and Privacy, Security and Privacy for Machine Learning, Mobile Security, Network Security, Privacy-Enhancing Technologies (PETs), Process based Security Models and Methods, Risk analysis, Side Channel Attacks, Software Security, Static and Dynamic Code Analysis for Security and Privacy, Security and Privacy for IoT, Cyber-Physical Systems, Critical Infrastructures, Security and Privacy Awareness, Security Requirements, Secure Design of Applications, Usable Security and Privacy, Threats and Attack Modelling, Trusted Computing, Trust Models, Trust Management, Web Application Security and Privacy
Event listing ID:
1651367
2
webinar — Optica Online Industry Meeting: Quantum Key Distribution
09 Sep 2025 • online, Any Location (virtual event)
Organizer:
Optica
Abstract:
Join us for the OPTICA Online Industry Meeting on Quantum Key Distribution (QKD), where experts will discuss the latest developments and future prospects of secure communication technologies. This event will address the current challenges in QKD implementation, such as achieving long-distance quantum entanglement distribution, overcoming noise and loss in quantum channels, and integrating QKD with existing network infrastructures. These challenges are crucial to ensure the reliability and scalability of quantum-secure communication systems. The meeting will also highlight the opportunities presented by QKD, including unparalleled security through quantum principles, resistance against cryptographic attacks by quantum computers, and the potential to establish global secure communication networks.
Topics:
Key topics will include advancements in quantum repeaters, quantum cryptography protocols, and practical applications of QKD in sectors such as finance, healthcare, and government. Engage with industry leaders to explore strategies for advancing QKD technology and its role in shaping the future of secure communications.
Event listing ID:
1628631
3
BL2025 — Blockchain Life 2025
28 Oct 2025 - 29 Oct 2025 • Dubai, United Arab Emirates
Abstract:
The 15th Blockchain Life Forum is the highly anticipated crypto event of 2025, drawing over 12,000 attendees, including leading figures in web3, cryptocurrencies, and mining. This premier gathering will feature founders and top executives from the industry's most prestigious companies, who will share crucial strategies for capitalizing on the upcoming Bull Run. Moreover, attendees will enjoy exclusive access to behind-the-scenes negotiations and gain valuable insights from private discussions. With unparalleled networking opportunities within this elite community, Blockchain Life 2025 is positioned to be the must-attend event shaping the future of the crypto industry.
Event listing ID:
1638536
4
Dagstuhl-Seminar — Symmetric Cryptography
01 Feb 2026 - 06 Feb 2026 • Schloss Dagstuhl, Germany
Organizer:
Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH
Abstract:
IT Security plays a vital role in our society. For example, when multiple parties communicate via a mobile phone or chat, or during online shopping, security takes a decisive part in protecting the users, the service operators, and in maintaining public confidence in the system. Cryptography is an essential concept to be implemented in the underlying system. Modern cryptography can be divided into two distinct subareas, symmetric cryptography (where all parties share the same secret key) and asymmetric cryptography (where all parties are in possession of a public key and a private key). We plan to discuss in detail timely topics related to the design and analysis of symmetric cryptographic schemes.
Event listing ID:
1670475
5
Workshop — Novel lattice assumptions
13 Jul 2026 - 17 Jul 2026 • ICMS, Bayes Centre, Edinburgh , United Kingdom
Organizer:
The International Centre for Mathematical Sciences (ICMS)
Abstract:
While lattice-based cryptography has been successful, a consensus is forming that we have reached a limit of what we can do from such well-established problems. Thus, researchers are introducing novel variants of these presumed-hard problems to develop quantum-safe privacy-enhancing technologies (PETs). Many PETs lack efficient lattice-based or other efficient post-quantum constructions. Examples include advanced encryption schemes with fine-grained access control, blind signatures, anonymous credentials, oblivious PRFs, and threshold constructions. Adopting novel hardness assumptions reflects a long-standing tension in cryptography: more structure enables advanced functionalities but may offer flexibility to solve presumed-hard problems, invalidating their hardness. As these assumptions proliferate, the risk grows that they remain understudied and may lack the robustness to serve as foundations for a privacy-respecting post-quantum digital society.
Event listing ID:
1670071


Conference-Service.com offers, as part of its business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

No tracking | No pop-ups | No animations
Last updated: 23 July 2025