Search for "30" returned 4248 results

Ling - High level system programming
34 min

Ling - High level system programming

modular and precise resource management

Glass Hacks
60 min

Glass Hacks

Fun and frightening uses of always-on camera enabled…

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom