Menu

Post-Snowden Cryptography Part II

  • Wednesday, April 22, 2015 | 11:30 AM – 12:20 PM | West | Room: 2000

View all Sessions

The Snowden revelations have shown that intelligence agencies have been successful in undermining cryptography by using a broad range of techniques. In response, cryptographic standards and implementations are being scrutinized to evaluate whether they resist a powerful threat model, that includes subversion of the supply chain and sophisticated malware. In this panel, four top experts in the area discuss which secure solutions are available today and what the cryptographic research and deployment challenges are for academia and industry.

Participants

This document was retrieved from https://www.rsaconference.com/events/us15/agenda/sessions/1763/post-snowden-cryptography-part-ii on Sun, 11 Dec 2016 02:58:44 -0500.
© 2016 EMC Corporation. All rights reserved.