Cryptographic Implementations


Posted on in Presentations

This Cryptography session will cover the following topics: Topic 1: Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms Topic 2:Optimisations and tradeoffs for Helib

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Nicky Mouha

Speaker

Researcher, Strativia / NIST Associate

Lea Nürnberger

Speaker

PhD Student, Norwegian University of Science and Technology, NTNU


Share With Your Community