Search for "33" returned 3656 results

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

“Nabovarme” opensource heating infrastructure in Christiania
30 min

“Nabovarme” opensource heating infrastructure in Christiania

Freetown Christiania´s digitally controlled/surveyed…

Community
62 min

Community

Social Life & Life in the early 21st century

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

Conquering Large Numbers at the LHC
41 min

Conquering Large Numbers at the LHC

From 1 000 000 000 000 000 to 10: Breaking down 14 Orders…

Dead Man Edition
61 min

Dead Man Edition

Auf dem Weg zu fairer Elektronik am Beispiel der Elkos …

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?