Search for "crypto wars" returned 318 results

OWASP ProActive Controls
69 min

OWASP ProActive Controls

Sichere Anwendungen erstellen?

Gestatten: The Flash
62 min

Gestatten: The Flash

Security von Embedded Systemen pimpen - Wieso? Weshalb? Wow!

Security Evaluation of Russian GOST Cipher
59 min

Security Evaluation of Russian GOST Cipher

Survey of All Known Attacks on Russian Government…

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
59 min

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit

Ein Streifzug durch die Fehler in der Kryptografie

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks