LISA21 - The Cornerstone for Cybersecurity—Cryptographic Standards
The Cornerstone for Cybersecurity—Cryptographic Standards
Lily Chen
This presentation will introduce NIST Cryptographic Standards and their applications in cybersecurity. The presentation will also discusses transitions and validations. It highlights challenges and solutions for next generation cryptographic standards, including challenges to deal with quantum threats, new cryptography transition, and lightweight cryptography for constrained devices.
View the full LISA21 program at https://www.usenix.org/conference/lisa21/program
Видео LISA21 - The Cornerstone for Cybersecurity—Cryptographic Standards канала USENIX
Lily Chen
This presentation will introduce NIST Cryptographic Standards and their applications in cybersecurity. The presentation will also discusses transitions and validations. It highlights challenges and solutions for next generation cryptographic standards, including challenges to deal with quantum threats, new cryptography transition, and lightweight cryptography for constrained devices.
View the full LISA21 program at https://www.usenix.org/conference/lisa21/program
Видео LISA21 - The Cornerstone for Cybersecurity—Cryptographic Standards канала USENIX
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![LISA21 - Hands-Off Testing for Networked Filesystems](https://i.ytimg.com/vi/XEtD4gMnezY/default.jpg)
![WWDC 2021 — June 7 | Apple](https://i.ytimg.com/vi/0TD96VTf0Xs/default.jpg)
![LISA11 - Fork Yeah! The Rise and Development of illumos](https://i.ytimg.com/vi/-zRN7XLCRhc/default.jpg)
![LISA14 - Open Compute Project and the Changing Data Center](https://i.ytimg.com/vi/KAFDI8j_h00/default.jpg)
![Network Security 101: Full Workshop](https://i.ytimg.com/vi/E03gh1huvW4/default.jpg)
![LISA21 - 5 Years of Cgroup v2: The Future of Linux Resource Control](https://i.ytimg.com/vi/kPMZYoRxtmg/default.jpg)
![How Science is Taking the Luck out of Gambling - with Adam Kucharski](https://i.ytimg.com/vi/658xlubwnDc/default.jpg)
![LISA21 - It's Time to Debloat the Cloud with Unikraft](https://i.ytimg.com/vi/L_HHEsxpenY/default.jpg)
![Will Quantum Computers break encryption?](https://i.ytimg.com/vi/6H_9l9N3IXU/default.jpg)
![LISA14 - "You Code Like a Sysadmin"—Software Development for the Non-Developer](https://i.ytimg.com/vi/ZjdqP-REoqc/default.jpg)
![SREcon16 - Performance Checklists for SREs](https://i.ytimg.com/vi/zxCWXNigDpA/default.jpg)
![LISA21 - Re-imagining Management Methods for Distributed and Clustered Systems with Kraken/Layercake](https://i.ytimg.com/vi/onMc-DAppi8/default.jpg)
![LISA21 - Exploiting Brain Vulnerabilities: Chaotic Good at Scale](https://i.ytimg.com/vi/fY3fzj_erMM/default.jpg)
![LISA21 - Selectively Sharing Multipath Routes in BGP](https://i.ytimg.com/vi/KeLiyLvzANM/default.jpg)
![LISA21 - Below: Interactive Resource Monitor for Modern Linux Systems](https://i.ytimg.com/vi/h4IYyMr181Q/default.jpg)
![LISA21 - Can Infrastructure as Code Apply to Bare Metal?](https://i.ytimg.com/vi/T0FObTCWNwc/default.jpg)
![The Insane Biology of: The Octopus](https://i.ytimg.com/vi/mFP_AjJeP-M/default.jpg)
![LISA21 - More Performant Cluster State Management Using Open Source Firmware and a Kraken](https://i.ytimg.com/vi/jWEWRchREK8/default.jpg)
![Introduction To Cyber Security | Cyber Security Training For Beginners | CyberSecurity | Simplilearn](https://i.ytimg.com/vi/z5nc9MDbvkw/default.jpg)
![Spanish For Beginners | Spanish 101 (Ep.1)](https://i.ytimg.com/vi/hyLl_0d0EBw/default.jpg)