Tag Archives: Cryptography

The current status of post-quantum cryptography

Presented by Douglas Stebila as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation In this talk, I’ll give an update on the standardization and migration of cryptographic systems to quantum-resistant algorithms.  I’ll talk about the current status of the NIST Post-Quantum Cryptography standardization project, …

Quantum Cryptography for Securing the Internet-of-Drones

Presented by Hussein Abulkassim as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation The long-term success of emerging technologies such as the internet-of-things (IoT) highly depends on their ability to secure data and communications for a long time. Internet-of-drones (IoDs), as one of the …

Develop with protocols for better OTR encryption

Cryptography done right has become important as the impacts of poor implementations are increasingly felt by journalists, whistleblowers and political activists around the world. Nik Unger and Dr. Ian Goldberg at the University of Waterloo have been working on improving cryptography for messaging. Cryptography is designed to provide a level of security for messages beyond …

Vulnerabilities Introduced by Features for Software-based Energy Measurement

Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber from Technische Universität Darmstadin Germany look into potential security side effects of new energy management features in CPUs. Energy management is an issue of growing importance as the amount of resources required to process and store the massive amount of data the information society requires. Software based …

Image-Centric Social Discovery Using Neural Network under Anonymity Constraint

A common part of social networks is sharing images. Storing and processing these images to provide engaging services to customers is resource intensive and social networks often rely on cloud services to provide these resources. This creates a potential security risk for the users of the social network platform. Simply encrypting the images before uploading …

Atty Mashatan – Strategic Implications of Quantum-Resistant Cryptography

  Dr. Mashatan is currently a faculty member at the Ted Rogers School of Information Technology Management of Ryerson University where her research focus has been on Information Systems Security and Privacy. Prior to joining Ryerson University, she was a Senior Information Security Consultant and Solutions Architect at CIBC. Prior to that Dr. Mashatan was …