Cryptographic Implementations


Posted on in Presentations

This Cryptography session will cover the following topics: Topic 1: Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms Topic 2:Optimisations and tradeoffs for Helib



Join the RSAC Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC Conference presentations. Learn more.


Participants
Nicky Mouha

Speaker

Researcher, Strativia / NIST Associate

Lea Nürnberger

Speaker

PhD Student, Norwegian University of Science and Technology, NTNU


Share With Your Community