Search for "32" returned 4075 results
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
50 min
The Matter of Heartbleed
What went wrong, how the Internet reacted, what we can…
40 min
No roborders, no nation, or: smile for a European surveillance propagation
How an agency implements Fortress Europe by degrading…
38 min
Fairtronics
A Tool for Analyzing the Fairness of Electronic Devices
36 min
Sim Gishel
A singing and dancing robot build to take part in casting…
31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions
59 min
TamaGo - bare metal Go framework for ARM SoCs.
Reducing the attack surface with pure embedded Go.
40 min
Radical Digital Painting
Fantastic Media Manipulation
41 min
Conquering Large Numbers at the LHC
From 1 000 000 000 000 000 to 10: Breaking down 14 Orders…
57 min
Kryptographie nach Snowden
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?
59 min
Hacking EU funding for a decentralizing FOSS project
Understanding and adapting EU legal guidelines from a FOSS…
62 min
radare demystified
after 1.0
60 min
The Only Thing We Know About Cyberspace Is That Its 640x480
One Terabyte of Kilobyte Age
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
60 min
Lets break modern binary code obfuscation
A semantics based approach
64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy
62 min