m (Text replacement - "Homepage=" to "Official Website=") |
Curator 91 (talk | contribs) |
||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
|Acronym=CRYPTO 1995 | |Acronym=CRYPTO 1995 | ||
− | |Title= | + | |Title=15th International Cryptology Conference |
|Ordinal=15 | |Ordinal=15 | ||
+ | |In Event Series=Event Series:CRYPTO | ||
+ | |Single Day Event=no | ||
+ | |Start Date=1995/08/27 | ||
+ | |End Date=1995/08/31 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=on site | ||
+ | |Venue=University of California | ||
+ | |City=Santa Barbara | ||
+ | |Region=California | ||
+ | |Country=Country:US | ||
+ | |Academic Field=Applied Cryptography; Cryptography | ||
+ | |Official Website=http://www.iacr.org/conferences/c95/ | ||
|Type=Conference | |Type=Conference | ||
− | |||
|TibKatId=332909786 | |TibKatId=332909786 | ||
|gndId=2148512-4 | |gndId=2148512-4 | ||
|DblpConferenceId=crypto/crypto95 | |DblpConferenceId=crypto/crypto95 | ||
− | |||
− | |||
|has general chair=Stafford Tavares | |has general chair=Stafford Tavares | ||
|has program chair=Don Coppersmith | |has program chair=Don Coppersmith | ||
Line 18: | Line 27: | ||
|pageEditor=User:Curator 75 | |pageEditor=User:Curator 75 | ||
|contributionType=1 | |contributionType=1 | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
{{Event Deadline}} | {{Event Deadline}} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=International Association for Cryptologic Research | ||
+ | }} | ||
{{Event Metric | {{Event Metric | ||
|Number Of Submitted Papers=151 | |Number Of Submitted Papers=151 |
Revision as of 08:28, 1 June 2023
Deadlines
Metrics
Submitted Papers
151
Accepted Papers
36
Venue
University of California, Santa Barbara, California, United States of America
The 15. Annual International Cryptology Conference (CRYPTO) 1995
Topics
- Applications
- Information Theory
- Authentication
- Key Distribution
- Block Ciphers
- Number Theory
- Combinatorics
- Practical Aspects
- Computational Complexity
- Protocols
- Computer Security
- Pseudo-Randomness
- Cryptanalysis
- Public Key
- Cryptographic Hash Functions
- Secret Sharing
- Digital Signatures
- Stream Ciphers
- Electronic Money
- Standards
- Foundations and Theory
- Zero Knowledge
- Implementation