Search for "Victor van der Veen"
prev
next
61 min
fun(ctional) operating system and security protocol…
40 min
a didactic live-gaming performance about dying women across…
53 min
Tools for Fooling the "Black Box"
43 min
Building Modern Cryptography
56 min
what is the winning move?
63 min
Algorithms define your priorities. Who else besides you can…
42 min
Finishing off the Nintendo DSi
39 min
Adventures running a NEC Vector Engine for fun and ...…
60 min
...or why adding BTLE to a device sometimes isn't smart at…
60 min
from key distribution to position-based cryptography
53 min
Artistic Strategies to expose generative text-to-image…
prev
next