Secure Implementation Methods

  • Wednesday, February 27, 2013 | 1:00 PM – 2:00 PM | Room: Room 122
View all Sessions

Security is a complex thing to achieve. One has to use secure algorithms and implement them so that no security breaches are introduced. This session presents a technique for secure implementation of the cryptographic hash function Grostel, as well as attacks on pseudorandom number generators in Java.

  • Topic 1: Randomly Failed! The State of Randomness in Current Java Implementations
  • Topic 2: Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Groestl

Participants

This document was retrieved from http://www.rsaconference.com/events/us13/agenda/sessions/159/secure-implementation-methods on Thu, 24 Jul 2014 08:19:44 -0400.
© 2014 EMC Corporation. All rights reserved.