We're thrilled to announce our first wave of incredible speakers for the Applied Cryptography track! Get ready to learn from 12 amazing experts who are pushing the boundaries of cryptographic research and real-world implementation. Let's dive in! 1/13
"Post Quantum Transaction Signatures for Ethereum One Year Later" with Antonio Sanso (@asanso) at the Applied Cryptography track. A year of real-world implementation reveals what actually works when quantum-resistant crypto meets blockchain reality.
Can traditional finance and blockchain privacy actually coexist? Yanis Meziane (@yanis_mezn) explores this critical question in "Bridging Financial Institutions and Privacy: Ethereum's Institutional Privacy Stack" at the Applied cryptography track. This session reveals how institutions can embrace blockchain transparency while protecting sensitive financial data.
Cryptography expert Alexander (@alexanderlee314) dives deep into "Comparing & Benchmarking Post Quantum Digital Signature Schemes" at the Applied Cryptography track. With quantum computers on the horizon, understanding which signature schemes will actually protect our digital world isn't just academic anymore.
Announcing: "Comparing & Benchmarking Post Quantum Digital Signature Schemes" with Andrey Ivasko (@aiv768) at the Applied Cryptography track. With quantum computers threatening current signature schemes, understanding which post-quantum alternatives actually deliver on performance and security is crucial for making the right choices today.
Quantum computers will render today's crypto wallets obsolete, but Simon Masson () is building the treasury protection we'll need tomorrow. The Kohaku wallet's post-quantum architecture isn't just future-proofing, it's survival planning for the crypto economy.
Learn how to dramatically accelerate L2 validity proofs while reducing computational overhead with Mohsen Ahmadvand () at the Applied Cryptography track. Faster verification means lower costs and better scalability for everyone building on Layer 2.
Direct EVM arithmetization has long been considered a nightmare for zkEVM developers, but zk_evm (@zk_evm) will show you why it's actually the path forward in the Applied Cryptography track. Turns out the scariest approach might just be the most elegant one.
Here's one you won't want to miss: Eugene Joo (@fhethereum) is bringing FHE to Ethereum in the Applied Cryptography track with "FHEthereum: FHE for Ethereum". This could be the privacy breakthrough that finally makes encrypted computation practical on the blockchain.
"From Stars to Bits: Verifying True Randomness from Space" with Toufic Batrice () at the Applied Cryptography track. When the universe becomes your entropy source, cryptographic security reaches astronomical levels.
What if the cosmos could guarantee truly unpredictable randomness for our digital world? Filip Rezabek (@rezabfil) explores this fascinating intersection of astrophysics and cryptography in "From Stars to Bits: Verifying True Randomness from Space". When earthbound entropy sources aren't enough, space might hold the key to unbreakable cryptographic security.
Cryptography expert Praneeth Srikanti (@bees_neeth) explores "There is such a thing as a free lunch - the deep fake refund economy" in the Applied Cryptography track. When synthetic media meets financial systems, the implications for fraud detection and prevention become game-changing.
Announcing: "Proving Ethereum in Real-Time With OpenVM 2.0" with Yi Sun (@theyisun) at the Applied Cryptography track. Real-time proof generation could fundamentally change how we think about blockchain verification and scalability.
1.85K