Mastering Asymmetric Encryption: Insights from NDC Oslo 2025 π
Join Eli Holderness as he explores the fundamentals and advanced concepts of asymmetric encryption in this in-depth session from NDC Oslo 2025. Perfect for developers looking to strengthen their security knowledge!

NDC Conferences
870 views β’ Jul 21, 2025

About this video
This talk was recorded at NDC Oslo in Oslo, Norway. #ndcoslo #ndcconferences #developer #softwaredeveloper
Attend the next NDC conference near you:
https://ndcconferences.com
https://ndcoslo.com/
Subscribe to our YouTube channel and learn every day:
/ @NDC
Follow our Social Media!
https://www.facebook.com/ndcconferences
https://twitter.com/NDC_Conferences
https://www.instagram.com/ndc_conferences/
#security #web #encryption
We all rely on asymmetric encryption every day, both as developers and consumers. It's what keeps our web traffic safe, what lets us sign our git commits, and what powers almost every single authentication flow.
Most of us will know the names of the most commonly used asymmetric encryption algorithms, RSA and ECDSA. But how many of us know how they actually work? What are their drawbacks and limitations, and where are they vulnerable?
Join me for a mathematical deep dive into one of the most fundamental underpinnings of our security infrastructure, journeying from the inception of these algorithms and their algebraic foundations to their modern day usage. We'll talk about why ECDSA has superseded RSA, why it's still not good enough in a post-quantum world, and what's next for asymmetric encryption.
Attend the next NDC conference near you:
https://ndcconferences.com
https://ndcoslo.com/
Subscribe to our YouTube channel and learn every day:
/ @NDC
Follow our Social Media!
https://www.facebook.com/ndcconferences
https://twitter.com/NDC_Conferences
https://www.instagram.com/ndc_conferences/
#security #web #encryption
We all rely on asymmetric encryption every day, both as developers and consumers. It's what keeps our web traffic safe, what lets us sign our git commits, and what powers almost every single authentication flow.
Most of us will know the names of the most commonly used asymmetric encryption algorithms, RSA and ECDSA. But how many of us know how they actually work? What are their drawbacks and limitations, and where are they vulnerable?
Join me for a mathematical deep dive into one of the most fundamental underpinnings of our security infrastructure, journeying from the inception of these algorithms and their algebraic foundations to their modern day usage. We'll talk about why ECDSA has superseded RSA, why it's still not good enough in a post-quantum world, and what's next for asymmetric encryption.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
870
Likes
30
Duration
52:00
Published
Jul 21, 2025
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now