Secure Implementation Methods
Security is a complex thing to achieve. One has to use secure algorithms and implement them so that no security breaches are introduced. This session presents a technique for secure implementation of the cryptographic hash function Grostel, as well as attacks on pseudorandom number generators in Java.
- Topic 1: Randomly Failed! The State of Randomness in Current Java Implementations
- Topic 2: Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Groestl