Conferences  >  Mathematics  >  Cryptography, Blockchain and Information Security

Select a location
ALL COUNTRIES (5)
1
CIMPA Summer School on Elliptic Curves and their Applications
14 Jul 2025 - 26 Jul 2025 • Yerevan, Armenia
Organizer:
Institute of Mathematics, National Academy of Sciences of Armenia
Abstract:
The goal of the summer school is to introduce students and junior scientists to the basics of the theory of elliptic curves and their applications in modern number theory and cryptography. The origins of the theory of elliptic curves go back to the 19th century, but it has become a central area of number theory only in the 20th century with the work of Mordell, Hasse, Weil and many others. A particularly prominent developments were the formulation of the conjecture of Birch and Swinnerton-Dyer, and the discovery of connections between elliptic curves and modular forms. The celebrated proof of Fermat’s Last Theorem by Wiles is the first general result on the modularity of elliptic curves – a topic which is still very much at the forefront of research in number theory. Elliptic curves also have come to play an important role in modern cryptography, and they continue to be extensively studied for possible future cryptosystems resistant to quantum computing.
Event listing ID:
1649601
2
ARES '25 — 20th International Conference on Availability, Reliability and Security
11 Aug 2025 - 14 Aug 2025 • Ghent, Belgium
Organizer:
Ghent University (BE), in collaboration with SBA Research (AT)
Abstract:
The 20th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES highlights the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES emphasizes the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.
Contact:
Phone: [+32 9 264 33 67];     Email: ares@ugent.be
Topics:
Authorization, Authentication, Access Control, Automated Vulnerability Repair, Availability, Confidentiality, Integrity, Botnets and Botnet Monitoring, Cloud Security, Compliance, Certification, Legal aspects related to Security and Privacy, Dependability, Resilience, Digital Forensics, Human Factors in Security and Privacy Identity Management, Incident Response and Prevention, Intrusion Detection, Fraud Detection, Machine Learning for Security and Privacy, Security and Privacy for Machine Learning, Mobile Security, Network Security, Privacy-Enhancing Technologies (PETs), Process based Security Models and Methods, Risk analysis, Side Channel Attacks, Software Security, Static and Dynamic Code Analysis for Security and Privacy, Security and Privacy for IoT, Cyber-Physical Systems, Critical Infrastructures, Security and Privacy Awareness, Security Requirements, Secure Design of Applications, Usable Security and Privacy, Threats and Attack Modelling, Trusted Computing, Trust Models, Trust Management, Web Application Security and Privacy
Event listing ID:
1651290
3
webinar — Optica Online Industry Meeting: Quantum Key Distribution
09 Sep 2025 • online, Any Location (virtual event)
Organizer:
Optica
Abstract:
Join us for the OPTICA Online Industry Meeting on Quantum Key Distribution (QKD), where experts will discuss the latest developments and future prospects of secure communication technologies. This event will address the current challenges in QKD implementation, such as achieving long-distance quantum entanglement distribution, overcoming noise and loss in quantum channels, and integrating QKD with existing network infrastructures. These challenges are crucial to ensure the reliability and scalability of quantum-secure communication systems. The meeting will also highlight the opportunities presented by QKD, including unparalleled security through quantum principles, resistance against cryptographic attacks by quantum computers, and the potential to establish global secure communication networks.
Topics:
Key topics will include advancements in quantum repeaters, quantum cryptography protocols, and practical applications of QKD in sectors such as finance, healthcare, and government. Engage with industry leaders to explore strategies for advancing QKD technology and its role in shaping the future of secure communications.
Event listing ID:
1628675
4
BL2025 — Blockchain Life 2025
28 Oct 2025 - 29 Oct 2025 • Dubai, United Arab Emirates
Abstract:
The 15th Blockchain Life Forum is the highly anticipated crypto event of 2025, drawing over 12,000 attendees, including leading figures in web3, cryptocurrencies, and mining. This premier gathering will feature founders and top executives from the industry's most prestigious companies, who will share crucial strategies for capitalizing on the upcoming Bull Run. Moreover, attendees will enjoy exclusive access to behind-the-scenes negotiations and gain valuable insights from private discussions. With unparalleled networking opportunities within this elite community, Blockchain Life 2025 is positioned to be the must-attend event shaping the future of the crypto industry.
Event listing ID:
1638503
5
Workshop — Novel lattice assumptions
13 Jul 2026 - 17 Jul 2026 • ICMS, Bayes Centre, Edinburgh , United Kingdom
Organizer:
The International Centre for Mathematical Sciences (ICMS)
Abstract:
While lattice-based cryptography has been successful, a consensus is forming that we have reached a limit of what we can do from such well-established problems. Thus, researchers are introducing novel variants of these presumed-hard problems to develop quantum-safe privacy-enhancing technologies (PETs). Many PETs lack efficient lattice-based or other efficient post-quantum constructions. Examples include advanced encryption schemes with fine-grained access control, blind signatures, anonymous credentials, oblivious PRFs, and threshold constructions. Adopting novel hardness assumptions reflects a long-standing tension in cryptography: more structure enables advanced functionalities but may offer flexibility to solve presumed-hard problems, invalidating their hardness. As these assumptions proliferate, the risk grows that they remain understudied and may lack the robustness to serve as foundations for a privacy-respecting post-quantum digital society.
Event listing ID:
1670159


Conference-Service.com offers, as part of its business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

No tracking | No pop-ups | No animations
Last updated: 22 July 2025