Key Management and Protection: Evaluation of Hardware, Tokens, TEEs and MPC

Nigel Smart, Professor, KU Leuven One of the pillars of cryptography implementation is the secure storage and management of the keys used to perform cryptog...

RSA Conference•946 views•49:48

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

Nigel Smart, Professor, KU Leuven One of the pillars of cryptography implementation is the secure storage and management of the keys used to perform cryptographic operations. This session will review the varied cryptographic key management and protection technologies available today, including new emerging solutions designed to enhance security and usability in a dispersed, connected digital IT environment.Learning Objectives:1: Review the varied cryptographic key management and protection technologies available today.2: Discuss key criteria for evaluating the security strength of key protection mechanisms.3: Provide a security and usability assessment of key protection models.Pre-Requisites:Basic knowledge of cryptography/key management.

Video Information

Views
946

Total views since publication

Likes
8

User likes and reactions

Duration
49:48

Video length

Published
Mar 8, 2019

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.