If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm
Share
An error occurred while retrieving sharing information. Please try again later.
Within cryptocurrency and blockchain solutions, the concepts of decentralization, security, scalability and privacy are all enabled by cryptography. If we are to believe that these technical solutions are reliable, we are relying on the cryptography they utilize. Audits of both the types and implementations of cryptography by industry professionals are critical to advancing these solutions. We'll discuss what it means to audit cryptography, how best to approach it and what we see as the future of cryptography audits.
Panelists:
…...more
Within cryptocurrency and blockchain solutions, the concepts of decentralization, security, scalability and privacy are all enabled by cryptography. If we are to believe that these technical solutions are reliable, we are relying on the cryptography they utilize. Audits of both the types and implementations of cryptography by industry professionals are critical to advancing these solutions. We'll discuss what it means to audit cryptography, how best to approach it and what we see as the future of cryptography audits.
Panelists:
Jean-Philippe (JP) Aumasson is the Chief Security Officer and cofounder of Taurus, a Swiss financial tech company specializing in digital assets infrastructure. Since 2006, he has authored more than 60 research articles in the field of cryptography and designed the widely used hash functions BLAKE2 and SipHash. The author of the acclaimed book Serious Cryptography (No Starch Press, 2017), he speaks regularly at information security and technology conferences. Twitter @veorq
Thomas Pornin is a Technical Director at NCC Group, specialized in cryptography. His research focuses on the design and implementation of cryptographic algorithms, with an emphasis on defense against timing-based side channel leaks; he is the author of BearSSL, an SSL/TLS library that embodies this approach and is optimized for constrained embedded systems. He is also an active participant to cryptographic competitions (AES, eSTREAM, SHA-3, PHC, and the ongoing Post-Quantum standardization process). Twitter @BearSSLnews
Taylor Hornby is a security engineer at the Electric Coin Company. He got started in the security industry by finding bugs in open-source encrypted filesystems and now he spends a lot of time analyzing the Zcash protocol to find vulnerabilities. Twitter @DefuseSec
isis agora lovecruft (they/them) has worked as a cryptographic consultant and cryptographic engineer for over a decade. They have contributed to numerous privacy focused organisations and critical security system, including Tor, Signal, Zcash, EFF, Riseup, and others. In their career, they have advised cryptographic endeavours at several Fortune 500 companies, and their code has been successfully deployed in products with billions of users. In their spare time, isis enjoys tending to gardens of rare and poisonous plants, and hiking with their Irish Wolfhound named Merlin. Twitter @isislovecruft
Moderator:
Liz Steininger is the CEO/Managing Director of Least Authority in Berlin, a company supporting people’s right to privacy through the development and support of free and open source software and providing security audits to other projects. Twitter @liz315