♫musicjinni

Overview of the NIST Post Quantum Algorithms

video thumbnail
Presentation name: Overview of the NIST Post Quantum Algorithms
Speaker: Robert Relyea
Description: This session will have a high level overview of the various NIST post-Quantum algorithms: 1) why they are needed, 2) how the families of the various algorithms work. 3) what are the broad characteristics of those families, 4) what algorithms are in those families, 5) how some of the one offs work. 6) Where to go to play with the algorithms. 5) What are the next steps in the competition.
[ https://sched.co/Jcdj]

Overview of the NIST Post Quantum Algorithms

Rekor - Cryptographic software release ledger - DevConf.CZ 2021

Lattice Based Cryptography Primer - DevConf.CZ 2021

Security compliance: A global perspective - DevConf.CZ 2023

Tomáš Mráz: FIPS 140-2 Compliance for Developers

Red Hat Advanced Cluster Security - Deep dive demo

OpenSSL's Journey: Technical Updates Governance and Community - DevConf.CZ 2023

Usable Cryptography with José

Day 1 | G202 - DevConf.CZ 2023

Day 2 | D0207 - DevConf.CZ 2024

DevSecOps: The Broken or Blurred Lines of Defense - John Willis (Red Hat) OpenShift Commons Briefing

First steps into security engineering

Red Hat Advanced Cluster Management Presents… Governance and Compliance

Ask an OpenShift Admin (Ep 40): Compliance and security

A Blueprint to Cloud Native Security on Red Hat OpenShift

OpenShift Commons Briefing Compliance as Code with Keith Basil (Red Hat)

IDG Webinar: Protecting Red Hat OpenShift Apps with Cloud-Native Backup and Recovery

TEEs: Why Open Source is Vital

Ask an OpenShift Admin (Ep 40): Compliance and security

DevSecOps is the Way (S1E2): Compliance

Protecting the world’s greatest open source ecosystem with Sigstore by Patrick Flynn , Appu Goundan

Managing the Open Hybrid Cloud with Red Hat Advanced Cluster Management

DevConf 2017 - Day 1 11:30 -12:30 am - Firmware Updates on Linux

Application Whitelisting - Steven Grubb, Red Hat

OpenShift Commons Briefing: Container Deployment & Security Best Practices John Morello (Twistlock)

OCB: Secure your Open Source Supply Chain with Sigstore

Securing GitOps Supply Chain with Sigstore and Kyverno - Roberto Carratala & Faz Sadeghi, Red Hat

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig

Red Hat Enterprise Linux Presents (E09): Automation with RHEL System Roles

On the security of the multivariate ring learning with errors problem

Disclaimer DMCA