Search for "Ray" returned 3332 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

Internet of toilets
35 min

Internet of toilets

Trends in the sanitarian territory

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

Hacking collective as a laboratory
29 min

Hacking collective as a laboratory

Hackers' knowledge studied by sociologist of science

The Moon and European Space Exploration
32 min

The Moon and European Space Exploration

Refocusing on the moon as a platform for future deep space…