Elliptic Curves in Cryptography
Hear talks on "TLS Cryptography" and "Elliptic Curves in Cryptography" at Boston CyberSecurity's meet-up.
Boston CyberSecurity’s VP Emily Stamm will describe what an elliptic curve is and why it is important in public key cryptography. She will explain the classical elliptic curve cryptography (ECC) that is widely used today, as well as the modern post-quantum isogeny-based cryptography, which is cryptography based on maps between elliptic curves that is conjectured to be resistant to quantum computing attacks.
Then, Laurent Poulain will present on a close look at the cryptography used behind TLS to achieve a secure connection between two parties who have never met before, and detect any tampering attempt.
CPE Certificates will given post event
You MUST bring a government issued ID to attend this event
- 5:30 – 6:00PM – Networking & Socializing (Food & Drinks Provided)
- 6:00 – 6:10PM – Introduction from Organizers and Sponsors
- 6:10 – 6:40PM – Speaker: Emily Stamm, VP of CSNP, Allstate Security Researcher
Session Title: Elliptic Curves in Cryptography
- 6:40 – 7:00PM – Q&A, Networking break
- 7:00 – 7:30PM – Speaker: Laurent Poulain
Session Title: TLS Cryptography
- 7:30 – 8:00PM – Q&A, Networking
Setting Up Hybrid Work for Success - Where Technology Will Fill the Gaps
We explored emerging trends around what the future of work could look like. In this three part series we will cover policy and culture, the built environment, and technological demand.
The SECURE Act - What It Means for the Participant Experience
By helping our clients understand their path to compliance and advocating for an experience that helps people plan for the future, we are setting them up for long term success.
Keep up with us
We deliver monthly insights, featuring invites to our virtual events and our latest thinking in innovation, design, and technology.