BEGIN:VCALENDAR
PRODID:-//AddEvent Inc//AddEvent.com v1.7//EN
VERSION:2.0
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:STANDARD
DTSTART:20261101T010000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20260308T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
DESCRIPTION:Elena Bakos Lang and Kevin Henry\, NCC Group\n\nThe security of cryptographic primitives and protocols is inextricably tied to that of the implementations deployed in the real world. Ensuring that these implementations are as secure as possible is thus a problem at the heart of cryptographic security.\n\nThis workshop will introduce common classes of cryptographic vulnerabilities\, including improper randomness generation\, side-channel attacks\, flaws in primitives or protocols\, and others\, and discuss secure coding practices that can help mitigate them\, based on our experiences auditing cryptographic code. This discussion will be complemented by a set of practical exercises to provide experience in spotting insecure constructions. Additionally\, as implementation quality is often tied to the quality of the source material\, we will present a case study on a recent widely implemented threshold signing protocol where ambiguous or unclear presentation in the academic source material has led to multiple critical implementation vulnerabilities.\n\nThis workshop is presented by NCC Group Cryptography Services practice in Waterloo\, Ontario.
X-ALT-DESC;FMTTYPE=text/html:<b>Elena Bakos Lang and <b>Kevin Henry, NCC Group</b></b><br><br>The security of cryptographic primitives and protocols is inextricably tied to that of the implementations deployed in the real world. Ensuring that these implementations are as secure as possible is thus a problem at the heart of cryptographic security.<br><br>This workshop will introduce common classes of cryptographic vulnerabilities, including improper randomness generation, side-channel attacks, flaws in primitives or protocols, and others, and discuss secure coding practices that can help mitigate them, based on our experiences auditing cryptographic code. This discussion will be complemented by a set of practical exercises to provide experience in spotting insecure constructions. Additionally, as implementation quality is often tied to the quality of the source material, we will present a case study on a recent widely implemented threshold signing protocol where ambiguous or unclear presentation in the academic source material has led to multiple critical implementation vulnerabilities.<br><br>This workshop is presented by NCC Group Cryptography Services practice in Waterloo, Ontario.
UID:1775388669addeventcom
SUMMARY:Lessons on secure deployment of cryptographic primitives
DTSTART;TZID=America/New_York:20240722T103000
DTEND;TZID=America/New_York:20240722T140000
DTSTAMP:20260405T113109Z
TRANSP:OPAQUE
STATUS:CONFIRMED
SEQUENCE:0
LOCATION:QNC 1201
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
BEGIN:VALARM
TRIGGER:-PT30M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR