Artwork

Content provided by NYUAD Institute. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by NYUAD Institute or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

Mathematical Cryptanalysis in the Real World

1:03:31
 
Distribuie
 

Manage episode 414597254 series 2404630
Content provided by NYUAD Institute. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by NYUAD Institute or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Cryptography is often regarded as a cornerstone of computer security. Yet, many public-key cryptographic algorithms show vulnerability to implementation errors or misinterpretations. This talk surveys 'weapons of math destruction' that have proven remarkably effective in identifying flawed cryptographic implementations in real-world scenarios. It also covers adventures in both active and passive network measurement of cryptographic protocols, highlighting the challenges and advancements in this critical field. Speaker Nadia Heninger, Associate Professor of Computer Science and Engineering, University of California, San Diego
  continue reading

285 episoade

Artwork
iconDistribuie
 
Manage episode 414597254 series 2404630
Content provided by NYUAD Institute. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by NYUAD Institute or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Cryptography is often regarded as a cornerstone of computer security. Yet, many public-key cryptographic algorithms show vulnerability to implementation errors or misinterpretations. This talk surveys 'weapons of math destruction' that have proven remarkably effective in identifying flawed cryptographic implementations in real-world scenarios. It also covers adventures in both active and passive network measurement of cryptographic protocols, highlighting the challenges and advancements in this critical field. Speaker Nadia Heninger, Associate Professor of Computer Science and Engineering, University of California, San Diego
  continue reading

285 episoade

Усі епізоди

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință