Search for "582" returned 1911 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Analyze the Facebook algorithm and reclaim data sovereignty
63 min

Analyze the Facebook algorithm and reclaim data sovereignty

Algorithms define your priorities. Who else besides you can…

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Scholz greift durch: Die AfD wird verboten - Deepfakes auch!
43 min

Scholz greift durch: Die AfD wird verboten - Deepfakes auch!

Das Zentrum für politische Schönheit und der Flyerservice…

Connected Mobility hacken: digital.bike.23
50 min

Connected Mobility hacken: digital.bike.23

Von E-Bikes in der Connected Mobility zur Entstehung eines…

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Das FlipDot-Projekt
42 min

Das FlipDot-Projekt

Spaß mit mechanischer Anzeige

SD-WAN a New Hop
49 min

SD-WAN a New Hop

How to hack software defined network and keep your sanity?