Search for "邯.byx" returned 4164 results

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…