• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Computing Conversations
  • Home
  • / ...
  • /Tech News
  • /Computing Conversations

Bruce Schneier Building Cryptographic Systems

By Charles Severance

By Charles Severance on
March 31, 2016

Computing ConversationsIn this Episode

Security guru Bruce Schneier talks with Charles Severance about security from the perspectives of both the National Security Agency and the National Institute of Standards and Technology.

From Computer's Issue No. 4 - April 2016


Charles Severance

About Charles Severance

Charles Severance is a clinical associate professor and teaches in the School of Information at the University of Michigan, and served as Computer's multimedia editor until 2018. Follow him on Twitter @drchuck or contact him at csev@umich.edu.

LATEST NEWS
Computing’s Top 30: Li Yang
Computing’s Top 30: Li Yang
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Computing’s Top 30: Rohan Basu Roy
Computing’s Top 30: Rohan Basu Roy
Episode 3 | How IEEE Can Support and Enhance Academia
Episode 3 | How IEEE Can Support and Enhance Academia
Read Next

Computing’s Top 30: Li Yang

Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists

Automating Compliance in Life Sciences for Real-Time Audit Readiness

Computing’s Top 30: Rohan Basu Roy

Episode 3 | How IEEE Can Support and Enhance Academia

Behind the Scenes: How SC Volunteers Power One of the World’s Fastest Growing Conferences and Trade Show

Computing’s Top 30: Bo Han

From Clicks to Conversations: How HCI Is Evolving in an AI-First World

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter