S15:E6 - What is cryptography and how to get into it (Marcus Carey)

S15:E6 - What is cryptography and how to get ...

Up next

S27:E8 - Learning AI (Matt Eland)

Meet Matt Eland, AI Specialist at Leading EDJE. Matt shares what sparked his passion for AI years ago, why he’s made the decision to go back to school for his master's degree and how he aims to continue spreading his expertise with the community. Show Links Partner with Dev & Cod ...  Show more

S27:E7 - Tech and Art (Chris Immel)

Meet Chris Immel, AI Engineer and Digital Artist at Luminifera Projects. Chris shares how he works to create a symbiosis between software development and art and why he remains optimistic when it comes to the AI revolution. Show Links Partner with Dev & CodeNewbie! (sponsor) Chri ...  Show more

Recommended Episodes

The quantum revolution: Q-Day
FT Tech Tonic

In the cybersecurity world they call it Q-Day, the day when a quantum computer will be built that can break the encryption of the internet.


John Thornhill and Madhumita Murgia speak to cybersecurity expert and former professional hacker Mark Carney about password cr ...

  Show more

Episode 2: Breaking Lightweight Symmetric Cryptography!
Cryptography FM

Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash func ...  Show more

RASPITE noses around the US power grid. Cisco will buy Duo Security. Sandworm afflicts lab investigating Novichok attack. Influence ops can be no-lose proposition.Crytpojacking and malspam.
CyberWire Daily

In today's podcast, we hear that Cisco plans to buy Duo Security. Dragos warns of the RASPITE adversary actor. Russia's Sandworm group is phishing people connected with a Swiss chemical forensics lab. How influence operations can be a no-lose proposition. A cryptojacking campaign ...  Show more

Episode 10: Exploiting Authenticated Encryption Key Commitment!
Cryptography FM

Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ...  Show more