Cryptographic Implementations
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore cutting-edge cryptographic implementations in this 46-minute conference talk from RSA Conference. Delve into two critical topics presented by experts Nicky Mouha and Lea Nürnberger. Uncover vulnerabilities in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms. Gain insights into optimizations and tradeoffs for Helib, enhancing your understanding of advanced cryptographic techniques. Learn from leading researchers in the field and stay up-to-date with the latest developments in cryptographic security.
Syllabus
Cryptographic Implementations
Taught by
RSA Conference
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera