Loading...

[AWACS 2016] Standards for the black hat- Daniel J. Bernstein

416 views

Loading...

Loading...

Transcript

The interactive transcript could not be loaded.

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on May 30, 2016

Do you think that your opponent's data is encrypted or authenticated by a particular cryptographic system? Do you think that your goal is to attack that system? Think bigger! There is a huge ecosystem that designs, evaluates, standardizes, selects, implements, and deploys cryptographic systems. This ecosystem is a much broader attack target than any particular cryptographic system is. This talk will give a few examples of ways that you can exploit the ecosystem.

Loading...

to add this to Watch Later

Add to

Loading playlists...