Post-Snowden Cryptography Part I

  • Wednesday, April 22, 2015 | 10:20 AM – 11:10 AM | West | Room: 2000

View all Sessions

The Snowden revelations have shown that intelligence agencies have been successful in undermining cryptography by using a broad range of techniques. In response, cryptographic standards and implementations are being scrutinized to evaluate whether they resist a powerful threat model, that includes subversion of the supply chain and sophisticated malware. In this panel, four top experts in the area discuss which secure solutions are available today and what the cryptographic research and deployment challenges are for academia and industry.


This document was retrieved from on Sat, 20 Jul 2019 23:19:13 -0400.