# Nist ECC Workshop posted June 2015

The Nist Workshop on Elliptic Curves is live now and streaming here: http://www.nist.gov/itl/csd/ct/eccworkshop_webcast.cfm

here is the timeline: http://www.nist.gov/itl/csd/ct/ecc-workshop.cfm

Hey! I'm **David**, cofounder of zkSecurity and the author of the Real-World Cryptography book. I was previously a crypto architect at O(1) Labs (working on the Mina cryptocurrency), before that I was the security lead for Diem (formerly Libra) at Novi (Facebook), and a security consultant for the Cryptography Services of NCC Group. This is my blog about **cryptography** and **security** and other related topics that I find interesting.

The Nist Workshop on Elliptic Curves is live now and streaming here: http://www.nist.gov/itl/csd/ct/eccworkshop_webcast.cfm

here is the timeline: http://www.nist.gov/itl/csd/ct/ecc-workshop.cfm

Well done! You've reached the end of my post. Now you can leave a comment or read something else.

Here are some random **popular** articles:

- - Tamarin Prover Introduction
- - BEAST: An Explanation of the CBC Attack on TLS
- - A New Public-Key Cryptosystem via Mersenne Numbers
- - Schnorr's Signature and non-interactive Protocols
- - How to Backdoor Diffie-Hellman: quick explanation
- - QUIC Crypto and simple state machines
- - Hash-Based Signatures Part I: One-Time Signatures (OTS)

Here are some random **recent** articles:

- - Contributing to open source projects and about learning zero-knowledge proofs
- - What's happening in the round 5 of PlonK?
- - The intuition behind the sum-check protocol in 5 minutes
- - Real-World Cryptography, a bit more than a year later
- - Creating cryptographic protocols with multiplications
- - The zero-knowledge attack of the year might just have happened, or how Nova got broken
- - A note on the elliptic curve pairing checks in zero-knowledge proofs

My book **Real-World Cryptography** is finished and shipping! You can purchase it here.

If you don't know **where to start**, you might want to check these popular articles:

- - Tamarin Prover Introduction
- - BEAST: An Explanation of the CBC Attack on TLS
- - A New Public-Key Cryptosystem via Mersenne Numbers
- - Schnorr's Signature and non-interactive Protocols
- - How to Backdoor Diffie-Hellman: quick explanation
- - QUIC Crypto and simple state machines
- - Hash-Based Signatures Part I: One-Time Signatures (OTS)

Here are the latest **links** posted:

- 06 Apr National Security Agency (Nsa) Tales Of The Krypt (Kryptos Society Newsletters) 1994-2003
- 07 Sep Inner Product Argument (Ipa) And A Polynomial Commitment Scheme
- 05 Sep Getting Apples, Bananas Or Cherries From Hash Functions
- 08 Aug Few Questions Answered About Plonk
- 31 May Sha-3 Buffer Overflow (Part 2)

You can also **suggest a link**.

## Comments

## leave a comment...