Elliptic Curves in Cryptography
Hear talks on "TLS Cryptography" and "Elliptic Curves in Cryptography" at Boston CyberSecurity's meet-up.
Boston CyberSecurity’s VP Emily Stamm will describe what an elliptic curve is and why it is important in public key cryptography. She will explain the classical elliptic curve cryptography (ECC) that is widely used today, as well as the modern post-quantum isogeny-based cryptography, which is cryptography based on maps between elliptic curves that is conjectured to be resistant to quantum computing attacks.
Then, Laurent Poulain will present on a close look at the cryptography used behind TLS to achieve a secure connection between two parties who have never met before, and detect any tampering attempt.
CPE Certificates will given post event
You MUST bring a government issued ID to attend this event
- 5:30 – 6:00PM – Networking & Socializing (Food & Drinks Provided)
- 6:00 – 6:10PM – Introduction from Organizers and Sponsors
- 6:10 – 6:40PM – Speaker: Emily Stamm, VP of CSNP, Allstate Security Researcher
Session Title: Elliptic Curves in Cryptography
- 6:40 – 7:00PM – Q&A, Networking break
- 7:00 – 7:30PM – Speaker: Laurent Poulain
Session Title: TLS Cryptography
- 7:30 – 8:00PM – Q&A, Networking
Cantina Celebrates Gold and Silver W3 Awards for its Mobile Apps and Sites Work
Cantina stood out among over 3,000 entrants in this year’s 17th Annual W3 Awards, winning one Gold and one Silver W3 Award.
Disrupt the Status Quo: Some Practical Observations
In our innovation consulting work we are privileged to work with successful leaders who manage the exploit-explore tension with surprising ease. Here are a few of our observations on what makes them different.
Keep up with us
We deliver monthly insights, featuring invites to our virtual events and our latest thinking in innovation, design, and technology.