Cryptography Under the Hood
Welcome to follow Xiphera's webinar series!
Xiphera’s webinar series Cryptography Under the Hood dives into the interesting and relevant topics of information security and cryptography. The webinar series covers for example topics such as post-quantum cryptography, homomorphic encryption, and resource-constrained security protocols, to name a few. Each webinar is free of charge.
Upcoming webinars
The upcoming webinars of the Cryptography Under the Hood webinar series and their registration links will appear here.
If you want to be the first one to know about our upcoming webinars, subscribe to our webinar email list!
Previous webinars
16/10/2024
How can hardware-based cryptographic mechanisms be used to secure the boot process of a computing platform. This webinar discovers how the confidentiality, integrity, and authenticity of the boot process can be secured with post-quantum secure boot.
05/06/2024
This webinar reviews the challenges and practical building blocks for strengthening digital resilience within modern IoT, Cloud, and AI environments.
06/03/2024
This webinar presents implementations of MACsec, IPsec, and TLS on hardware devices, and explores the similarities and differences between the three security protocols.
20/09/2023
Learn about the future of data protection with Xiphera's groundbreaking Post-Quantum Cryptography and QuickLogic's cutting-edge eFPGA technology.
01/06/2023
Exploring the use cases of TLS applications as well as the ongoing efforts to take Post-Quantum Cryptography (PQC) into use in TLS 1.3.
24/01/2023
This webinar dives into the principal questions regarding randomness and random numbers. What are random number generators? How are they built and tested? What can go wrong with random number generation?
06/09/2022
Introducing and reviewing the current situation of PQC standardisation process and presenting a clear summary of the selected standardisation algorithms.
08/06/2022
In this webinar, we talk about the importance of secure implementation of Elliptic Curve Cryptography (ECC), which has a significant role to play also for years to come in hybrid systems combining post-quantum cryptography with ECC.
09/03/2022
Reviewing the current status in quantum computing, and specifically its impact on the currently used public-key cryptographic algorithms.
16/11/2021
In Xiphera's first webinar, we talk about the benefits of hardware and FPGAs in particular for implementing cryptography.