Aligned with
This conference contributes to global sustainability by aligning its research discussions and academic sessions with key United Nations Sustainable Development Goals. It fosters knowledge exchange, innovation, and collaborative engagement.
This track explores the mathematical underpinnings of elliptic curves and their significance in cryptographic applications. Discussions will focus on the properties of elliptic curves and their role in public key encryption.
This session will delve into innovative algorithms that enhance cryptographic security, including those based on elliptic curves. Participants will analyze the efficiency and effectiveness of these algorithms in real-world applications.
This track focuses on the development and analysis of digital signature schemes utilizing elliptic curve cryptography. Emphasis will be placed on authentication protocols and their implications for data integrity.
This session will investigate the role of finite fields in cryptographic systems, particularly in relation to elliptic curves. Theoretical and practical aspects of finite field arithmetic will be discussed.
This track addresses the discrete logarithm problem and its critical importance in the security of cryptographic systems. Participants will explore various approaches to solving this problem and its implications for elliptic curve cryptography.
This session will cover the design and analysis of key exchange protocols based on elliptic curves. The focus will be on ensuring secure communication in various applications, including blockchain technology.
This track examines the intersection of elliptic curve cryptography and blockchain technology, highlighting security challenges and solutions. Discussions will include the role of cryptographic techniques in ensuring the integrity of blockchain systems.
This session will explore the challenges posed by quantum computing to current cryptographic systems, with a focus on elliptic curve-based approaches. Participants will discuss potential solutions and future directions for post-quantum cryptography.
This track investigates the applications of algorithmic number theory in the development of cryptographic algorithms. Emphasis will be placed on the interplay between number theory and elliptic curve cryptography.
This session will focus on pairing-based cryptography, including its mathematical foundations and practical applications. Participants will explore how pairing techniques can enhance security in various cryptographic protocols.
This track will examine the design and implementation of secure protocols aimed at protecting sensitive data. Discussions will include the integration of elliptic curve cryptography in ensuring confidentiality and integrity.