Search for "26" returned 4163 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…

Dissecting HDMI
63 min

Dissecting HDMI

Developing open, FPGA-based capture hardware for conference…

Building a high throughput low-latency PCIe based SDR
60 min

Building a high throughput low-latency PCIe based SDR

Lessons learnt implementing PCIe on FPGA for XTRX Software…

Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
58 min

Schweiz: Netzpolitik zwischen Bodensee und Matterhorn

E-ID, E-Voting, Netzsperren und andere netzpolitische…

Low Cost Non-Invasive Biomedical Imaging
35 min

Low Cost Non-Invasive Biomedical Imaging

An Open Electrical Impedance Tomography Project

Living Drones
31 min

Living Drones

From war pigeons in 1914 to cyborg moths in 2014

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

Afro TECH
30 min

Afro TECH

Afrofuturism, Telling tales of speculative futures