Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cryptography at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2018)

sw7i4g.jpg?width=750

1. Codes and Isogenies

Speakers: Dr. Reza Azarderakhsh, David Jao

Two further methods for obtaining post-quantum security are discussed, namely code-based and isogeny-based cryptography. Topic 1: Revocable Identity-based Encryption from Codes with Rank Metric (will be presented by Dr. Reza Azarderakhsh) Authors: Donghoon Chang; Amit Kumar Chauhan; Sandeep Kumar; Somitra Kumar Sanadhya Topic 2: An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange Authors: Brian Koziel; Reza Azarderakhsh; David Jao

>>Go To Presentation

2411md0.jpg?width=750

2. Cryptographic Protocols: Practical revocation and key rotation

Speakers: Fernando Krell, Dr. Adam Shull

Protocols related to key rotation and hidden service discovery are discussed. Topic 1: Practical Revocation and Key Rotation Authors: Steven Myers; Dr. Adam Shull Topic 2: Asynchronous Provably Secure Hidden Services Authors: Philippe Camacho; Fernando Krell

>>Go To Presentation

262pi4z.png?width=750

3. General Cryptography : Why Johnny The Developer Can’t Work With Public Key Certificates

Speakers: Mehdi Tibouchi, Martin Ukrop

A usability study of OpenSSL and a factorization method for moduli with two prime factors are discussed. Topic 1: Why Johnny the Developer Can’t Work with Public Key Certificates: An Experimental Study of OpenSSL Usability Authors: Martin Ukrop; Vashek Matyas Topic 2: Improved Factorization of N=p^r q^s Authors: Jean-Sebastien Coron; Rina Zeitoun

>>Go To Presentation

9gdlkg.jpg?width=750

4. Cryptanalysis Against Symmetric Key Schemes With Online Classical Queries And Offline Quantum Computations

Speakers: Guillaume Endignoux, Akinori Hosoyamada

Post-Quantum cryptography is discussed in relation to symmetric key and hash-based schemes. Topic 1: Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations Authors: Akinori Hosoyamada; Yu Sasaki Topic 2: Improving Stateless Hash-Based Signatures Authors: Jean-Philippe Aumasson; Guillaume Endignoux

>>Go To Presentation

wi50sz.jpg?width=750

5. Secure Storage: Composable And Robust Outsourced Storage

Speakers: Christian Badertscher, Jian Liu

Methods for securely outsourcing storage are discussed. Topic 1: Composable and Robust Outsourced Storage Authors: Christian Badertscher; Ueli Maurer Topic 2: Secure Deduplication of Encrypted Data: Refined Model and New Constructions Authors: Jian Liu; Li Duan; Yong Li; N. Asokan

>>Go To Presentation

1445we9.png?width=750

Your Complete Guide To Top Talks @RSA Conference 2018 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2018 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

 

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)