Search for person "Hunz" returned 6 results

52 min
Void the warranty!
How to start analyzing blackboxes

50 min
Finding the key in the haystack
A practical guide to Differential Power Analysis

58 min
The blackbox in your phone
Some details about SIM cards

45 min
Machine-to-machine (M2M) security
When physical security depends on IT security

59 min