Konferenzen  >  Mathematik  >  Kryptographie, Blockchain und Informationssicherheit

Wählen Sie ein Land aus
ALLE LÄNDER (3)
1
Dagstuhl-Seminar — Symmetric Cryptography
01. Feb 2026 - 06. Feb 2026 • Schloss Dagstuhl, Deutschland
Veranstalter:
Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH
Zusammenfassung:
IT Security plays a vital role in our society. For example, when multiple parties communicate via a mobile phone or chat, or during online shopping, security takes a decisive part in protecting the users, the service operators, and in maintaining public confidence in the system. Cryptography is an essential concept to be implemented in the underlying system. Modern cryptography can be divided into two distinct subareas, symmetric cryptography (where all parties share the same secret key) and asymmetric cryptography (where all parties are in possession of a public key and a private key). We plan to discuss in detail timely topics related to the design and analysis of symmetric cryptographic schemes.
Eintrags-ID:
1670464
2
GITEX AI EUROPE 2026
30. Jun 2026 - 01. Jul 2026 • Berlin, Deutschland
Zusammenfassung:
Accelerated by GITEX GLOBAL, the world’s largest tech and startup event, GITEX AI EUROPE brings together Europe’s AI pioneers, enterprise leaders, frontier startups, investors and policymakers to shape the future of artificial intelligence at scale.
Kontakt:
GITEX EUROPE;     Email: Marketing@gitexeurope.com
Eintrags-ID:
1693489
3
Workshop — Novel lattice assumptions
13. Jul 2026 - 17. Jul 2026 • ICMS, Bayes Centre, Edinburgh , Großbritannien
Veranstalter:
The International Centre for Mathematical Sciences (ICMS)
Zusammenfassung:
While lattice-based cryptography has been successful, a consensus is forming that we have reached a limit of what we can do from such well-established problems. Thus, researchers are introducing novel variants of these presumed-hard problems to develop quantum-safe privacy-enhancing technologies (PETs). Many PETs lack efficient lattice-based or other efficient post-quantum constructions. Examples include advanced encryption schemes with fine-grained access control, blind signatures, anonymous credentials, oblivious PRFs, and threshold constructions. Adopting novel hardness assumptions reflects a long-standing tension in cryptography: more structure enables advanced functionalities but may offer flexibility to solve presumed-hard problems, invalidating their hardness. As these assumptions proliferate, the risk grows that they remain understudied and may lack the robustness to serve as foundations for a privacy-respecting post-quantum digital society.
Eintrags-ID:
1670159


Conference-Service.com stellt der Öffentlichkeit ein Kalendarium wichtiger Konferenzen, Symposien und sonstiger Tagungen im wissenschaftlich-technischen Bereich zur Verfügung. Obwohl das Verzeichnis mit großer Sorgfalt zusammengestellt und ständig aktualisiert wird, weisen wir auf die Möglichkeit von Fehlern ausdrücklich hin. Bitte vergewissern Sie sich immer beim Veranstalter, bevor Sie über die Teilnahme oder Nichtteilnahme an einer Konferenz entscheiden.

Kein Tracking | Keine Pop-ups | Keine Animationen
Stand vom 9. Januar 2026