Post-Snowden Cryptography Part II

  • Wednesday, April 22, 2015 | 11:30 AM – 12:20 PM | West | Room: 2000

View all Sessions

The Snowden revelations have shown that intelligence agencies have been successful in undermining cryptography by using a broad range of techniques. In response, cryptographic standards and implementations are being scrutinized to evaluate whether they resist a powerful threat model, that includes subversion of the supply chain and sophisticated malware. In this panel, four top experts in the area discuss which secure solutions are available today and what the cryptographic research and deployment challenges are for academia and industry.


This document was retrieved from on Mon, 24 Jun 2019 05:22:16 -0400.