Explore cutting-edge cryptographic implementations in this 46-minute conference talk from RSA Conference. Delve into two critical topics presented by experts Nicky Mouha and Lea Nürnberger. Uncover vulnerabilities in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms. Gain insights into optimizations and tradeoffs for Helib, enhancing your understanding of advanced cryptographic techniques. Learn from leading researchers in the field and stay up-to-date with the latest developments in cryptographic security.
Overview
Syllabus
Cryptographic Implementations
Taught by
RSA Conference