Search for person "David Lange"
prev
next
34 min
Extending capability-based security models to achieve…
76 min
RSA factorization in the real world
65 min
Fun with lattices in cryptography and cryptanalysis
61 min
fun(ctional) operating system and security protocol…
36 min
From eyelid blinks to speech recognition
98 min
Essential Tips and Tricks
46 min
Strong metadata protection for asynchronous messaging
prev
next