Statements (57)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cryptography conference
|
gptkbp:country |
gptkb:India
|
gptkbp:field |
cryptography
information security |
gptkbp:firstHeld |
2000
|
gptkbp:focus |
gptkb:quantum_cryptography
gptkb:stream_ciphers gptkb:elliptic_curve_cryptography gptkb:homomorphic_encryption gptkb:post-quantum_cryptography crypt cryptographic protocols network security zero-knowledge proofs authentication hash functions public-key cryptography data integrity digital signatures key management secure communication applied cryptography data confidentiality digital forensics security protocols blockchain security block ciphers cryptographic algorithms trusted computing data authentication lattice-based cryptography secure multiparty computation symmetric-key cryptography privacy-enhancing technologies cryptographic applications cryptographic standards side-channel attacks cryptographic engineering cryptographic attacks cryptographic primitives cryptographic proofs cryptographic protocols analysis cryptographic protocols design cryptographic protocols implementation cryptographic protocols optimization cryptographic protocols security cryptographic protocols verification implementation security mathematical aspects of cryptography secure hardware theory and practice of cryptography |
gptkbp:frequency |
annual
|
https://www.w3.org/2000/01/rdf-schema#label |
INDOCRYPT
|
gptkbp:organizedBy |
gptkb:Cryptology_Research_Society_of_India
|
gptkbp:type |
gptkb:conference
|
gptkbp:bfsParent |
gptkb:Cryptology_Research_Society_of_India
|
gptkbp:bfsLayer |
8
|