YoVDO

Practically-Exploitable Cryptographic Vulnerabilities in Matrix

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Cryptography Courses Cryptographic Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore critical cryptographic vulnerabilities in the Matrix protocol through this 15-minute IEEE conference talk. Gain insights from experts Martin R. Albrecht, SofĂ­a Celi, Benjamin Dowling, and Daniel Jones as they discuss practical exploits and their implications for the security of Matrix-based systems. Understand the potential risks and learn about necessary mitigation strategies to enhance the robustness of Matrix implementations.

Syllabus

Practically-Exploitable Cryptographic Vulnerabilities in Matrix


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube