Secure Implementation Methods

  • Wednesday, February 27, 2013 | 1:00 PM – 2:00 PM | Room: Room 122

View all Sessions

Security is a complex thing to achieve. One has to use secure algorithms and implement them so that no security breaches are introduced. This session presents a technique for secure implementation of the cryptographic hash function Grostel, as well as attacks on pseudorandom number generators in Java.

  • Topic 1: Randomly Failed! The State of Randomness in Current Java Implementations
  • Topic 2: Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Groestl


This document was retrieved from on Sun, 21 Jul 2019 15:27:42 -0400.