Cryptographic Implementations


Posted on in Presentations

This Cryptography session will cover the following topics: Topic 1: Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms Topic 2:Optimisations and tradeoffs for Helib


Participants
Nicky Mouha

Speaker

Researcher, Strativia / NIST Associate

Lea Nürnberger

Speaker

PhD Student, Norwegian University of Science and Technology, NTNU


Share With Your Community