Conferences  >  Mathematics  >  Cryptography, Blockchain and Information Security

Select a location
ALL COUNTRIES (3)
1
ICSS — 11th International Conference on Software Security (ICSS 2025)
20 Dec 2025 - 21 Dec 2025 • Sydney, Australia
Abstract:
11th International Conference on Software Security (ICSS 2025) is traditionally, security in software has been thought to be something that can be easily added on as a patch, post-development, and sometimes even after the deployment of the software. According to the US-Computer Emergency Readiness Team (US-CERT), “most successful attacks result from targeting and exploiting known, non-patched software vulnerabilities and insecure software configurations, many of which are introduced during design and code.” Hence, it is imperative that secure design, coding and testing principles as well as deployment and maintenance are thoroughly embedded in the software development lifecycle. At the same time, software security is very inter-disciplinary, as software is being developed for a variety of applications – web, Internet, database, single and distributed computer systems, etc.
Topics:
• Software Security Attacks and Solutions • Static and Dynamic Code Analysis for Software Security • Validation, Verification and Testing for Software Security • Virtualization and Cloud Computing for Software Security • Cryptography for Software Security • Firewalls and Intrusion Detection/Prevention Systems for Software Security • Software Penetration and Protection
Event listing ID:
1676044
2
Dagstuhl-Seminar — Symmetric Cryptography
01 Feb 2026 - 06 Feb 2026 • Schloss Dagstuhl, Germany
Organizer:
Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH
Abstract:
IT Security plays a vital role in our society. For example, when multiple parties communicate via a mobile phone or chat, or during online shopping, security takes a decisive part in protecting the users, the service operators, and in maintaining public confidence in the system. Cryptography is an essential concept to be implemented in the underlying system. Modern cryptography can be divided into two distinct subareas, symmetric cryptography (where all parties share the same secret key) and asymmetric cryptography (where all parties are in possession of a public key and a private key). We plan to discuss in detail timely topics related to the design and analysis of symmetric cryptographic schemes.
Event listing ID:
1670442
3
Workshop — Novel lattice assumptions
13 Jul 2026 - 17 Jul 2026 • ICMS, Bayes Centre, Edinburgh , United Kingdom
Organizer:
The International Centre for Mathematical Sciences (ICMS)
Abstract:
While lattice-based cryptography has been successful, a consensus is forming that we have reached a limit of what we can do from such well-established problems. Thus, researchers are introducing novel variants of these presumed-hard problems to develop quantum-safe privacy-enhancing technologies (PETs). Many PETs lack efficient lattice-based or other efficient post-quantum constructions. Examples include advanced encryption schemes with fine-grained access control, blind signatures, anonymous credentials, oblivious PRFs, and threshold constructions. Adopting novel hardness assumptions reflects a long-standing tension in cryptography: more structure enables advanced functionalities but may offer flexibility to solve presumed-hard problems, invalidating their hardness. As these assumptions proliferate, the risk grows that they remain understudied and may lack the robustness to serve as foundations for a privacy-respecting post-quantum digital society.
Event listing ID:
1670060


Conference-Service.com offers, as part of its business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

No tracking | No pop-ups | No animations
Last updated: 2 October 2025