YoVDO

Practically-Exploitable Cryptographic Vulnerabilities in Matrix

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Cryptography Courses Cryptographic Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore critical cryptographic vulnerabilities in the Matrix protocol through this 15-minute IEEE conference talk. Gain insights from experts Martin R. Albrecht, SofĂ­a Celi, Benjamin Dowling, and Daniel Jones as they discuss practical exploits and their implications for the security of Matrix-based systems. Understand the potential risks and learn about necessary mitigation strategies to enhance the robustness of Matrix implementations.

Syllabus

Practically-Exploitable Cryptographic Vulnerabilities in Matrix


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Zero - The Funniest Number in Cryptography
Black Hat via YouTube
What Cryptographic Library Developers Think About Timing Attacks
IEEE via YouTube
Postcards from the Post HTTP World - Amplification of HTTPS Vulnerabilities in the Web Ecosystem
IEEE via YouTube
Cryptography: How Its Usage Affects Protection - 2018
LASCON via YouTube
Badkeys - Finding Weak Cryptographic Keys At Scale
nullcon via YouTube