Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore cutting-edge cryptographic implementations in this 46-minute conference talk from RSA Conference. Delve into two critical topics presented by experts Nicky Mouha and Lea Nürnberger. Uncover vulnerabilities in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms. Gain insights into optimizations and tradeoffs for Helib, enhancing your understanding of advanced cryptographic techniques. Learn from leading researchers in the field and stay up-to-date with the latest developments in cryptographic security.
Syllabus
Cryptographic Implementations
Taught by
RSA Conference