Tom Berson
Encyclopedia
Thomas Alan Berson is a cryptographer and computer security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

 researcher. His notable work includes several cryptanalytic attacks
Cryptanalysis
Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key...

, and research in the practical use of cryptographic protocol
Cryptographic protocol
A security protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.A protocol describes how the algorithms should be used...

s, particularly in computer networks.

A founding member of the International Association for Cryptologic Research
International Association for Cryptologic Research
The International Association for Cryptologic Research is a non-profit scientific organization whose purpose is to further research in cryptology and related fields...

, Tom Berson has been one of its officers since 1983, and was the first person selected as an IACR Fellow. He served as editor of the Journal of Cryptology
Journal of Cryptology
The Journal of Cryptology is a scientific journal in the field of cryptology and cryptography. The journal is published quarterly by the International Association for Cryptologic Research....

from 1986 to 2001. At ASIACRYPT
Asiacrypt
Asiacrypt is an important international conference for cryptography research. The full name of the conference is currently International Conference on the Theory and Application of Cryptology and Information Security, though this has varied over time...

2000 he delivered the IACR Distinguished Lecture, Cryptography Everywhere.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK