Home Add to Favorite Contact Submit  
           07 May, 2021

Category:  Press » Software


Certicom ECC Conference to Focus on Cutting Edge Cryptography

         Views: 2211
2006-06-14 03:47:30     
Certicom Corp.

Certicom Corp. (TSX: CIC) today announced that Dr. John Manferdelli, Distinguished Engineer and General Manager of Incubation for Advanced Policy and Strategy in the office of the CTO at Microsoft Corp., will be the keynote speaker at the Certicom ECC Conference, on November at 14-16 in Toronto, Canada.

The annual Certicom ECC Conference offers a forum for discussing pure mathematics and real-world applications of cryptography, as well as evolving security standards. The three-day conference attracts cryptography leaders in academia and the security industry from around the world.

"ECC is found in nearly every major cryptography standard in the world and its adoption continues to grow," said Dr. Scott Vanstone, Certicom founder and EVP strategic technology. "As proponents of ECC, we are confident that it will soon become the de facto public-key scheme for securing electronic assets."

At the conference, Manferdelli will discuss the ECC support that will be included in Windows Vista and some of the benefits of ECC for software developers. Manferdelli will also examine how the role of interoperability has helped to accelerate the adoption and use of ECC in the software industry.

ECC is used in a growing number of industries - ranging from consumer electronics, wireless devices and semiconductors to financial services and government. The U.S. government, through the NSA, recommends ECC-based security technology for the protection of government communications. Its implementations are used to protect content, securely transmit data and digitally sign documents. The small size of ECC algorithms is the main driver behind its popularity.

For more information about the Certicom ECC Conference or to register, visit: http://www.certicom.com/conference2006.

About Certicom

Certicom protects the value of your content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit http://www.certicom.com

Certicom, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders. Information subject to change.

Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.

Specialized in: Ecc Conference - Focus On Cutting Edge - Cryptography
URL: http://www.certicom.com
Print press release      Bookmark this page
Related Press releases 
Maryland Custom Software Development Company Educates On SaaS (Popularity: ): Frederick, Maryland ( press.abc-directory.com ) October 25, 2020 - Orases, a Maryland custom software development company, recently released a new educational resource on its website that discusses SaaS vs. custom software development. The new article is guided by the expert software developers at Orases who understand the difference between SaaS programs and getting custom software development done. They hope this new article will help readers understand the difference between these ...
Exacttrend Software announces the update of WMS Log Analyzer 6.7 (Popularity: ): May 26, 2020 - Exacttrend Software announces the update of WMS Log Analyzer 6.7, its a Log Analyzer for Microsoft Windows Media Services server log files.WMS Log Analyzer visitor activity analysis application for your Microsoft Windows Media Services. Unlike other analyzers, WMS Log Analyzer has been designed especially for analyzing Windows Media Services log files and supports the entire set of Windows Media Services log file data and provides the ...
Nsasoft today announces the immediate availability of Nsauditor Network Security Auditor 3.2.1 (Popularity: ): Apr 8, 2020 - Nsasoft US LLC. today announces the immediate availability of Nsauditor Network Security Auditor 3.2.1, the Latest Version of its Popular Network Security Audit and Network Monitoring software.Nsauditor Version 3.2.1 adds latest network security vulnerabilities detection and updates network databases. The software contains a built-in database of known network security vulnerabilities, which allows you to select the items for scanning and add custom entries. With Nsauditor Network ...
Mapping Company Educates Readers On Sales Territory Mapping (Popularity: ): Wake Forest, North Carolina (press.abc-directory) March 26, 2020 - Geographic Enterprises, a North Carolina mapping company, recently discussed the importance of utilizing sales territory mapping. Geographic Enterprises is the leading organization in the mapping software field that offers online mapping and solutions. They help businesses gain powerful insight about their market and operations through targeting consumer demographics and optimizing logistics.Sales territory mapping adds to the overall organization and success of ...
Colasoft Announces Release of Capsa Network Analyzer v13 (Popularity: ): Chengdu, China, March 9, 2020-Colasoft Co., Ltd., a visionary provider of network performance analysis and diagnostics solutions, today announced the release of Capsa Network Analyzer v13, a real-time portable network analyzer for wired and wireless network monitoring, bandwidth analysis and network troubleshooting.The new Capsa v13 merges all the settings of Network Profile and Analysis Profile to Analysis Settings. The change provides user more flexibility in analysis configurations when analyzing traffic. ...

Press release home snapshot 

Related Business 
Cutting Edge Stone (Popularity: ): Cutting Edge Stone was founded in Melbourne in 2004 by Manager and Director, David Schlieper. David and his team have over 40 years experience in the fabrication and installation of stone. Since our inception, Cutting Edge Stone is the leading fabricator and installer of Stone Italiana in Victoria. Cutting Edge Stone also specialises in natural stone including marble, granite and limestone together with re-constituted stone.
The Winter Simulation Conference (Popularity: ): This annual conference offers the cutting edge in simulation research and practice. Includes mailing list.
Royal Holloway's Security research Group (Popularity: ): Interests: Security Analysis of AES, PKI, Quantum Cryptography, mobile privacy, ECC, Digital signatures, Authentication protocols
Information Security and Cryptography: ETH, Zurich (Popularity: ): Interests: Information-theoretic cryptography, Secure distributed computation, Public-key cryptography and digital signatures, Number-theoretic and algebraic cryptography, Zero-knowledge protocols, Complexity theory
Cutting Edge CSS (Popularity: ): A site that explores the cutting edge possibilities of CSS. Both fun and serious examples and demonstrations in all aspects of css from simple navigation to complex layouts.
Jan Graves - The Cutting Edge of Fitness (Popularity: ): Jan Graves, an ACE & AFAA certified personal trainer, brings the cutting edge in fitness to the classes she teaches.
Fraser Gallery (Popularity: ): Bethesda, MD gallery offering contemporary regional, national and international fine artists with a focus on cutting edge realism and photography.
ISAR: The International Society for Astrological Research (Popularity: ): Cutting edge astrological research organization. Information about current projects and membership, with articles, conference tapes and journal.
Cryptography, Security and Linux (Popularity: ): A site with cryptography related material (still under construction).
North American Cryptography Archives (Popularity: ): A comprehensive archive for cryptography source code, software, liturature and links.