Search for "841" returned 1866 results
60 min
Quantum Cryptography
from key distribution to position-based cryptography
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
69 min
Grundrechte gelten nicht im Weltall!
Die absurdesten Szenen aus dem…
56 min
Viva la Vita Vida
Hacking the most secure handheld console
58 min
When hardware must „just work“
An inside look at x86 CPU design
60 min
Concepts for global TSCM
getting out of surveillance state mode
55 min
White-Box Cryptography
Survey
58 min
Paypals War on Terror
A Historical Re-Enactment of the PayPal14
58 min
Hacking how we see
A way to fix lazy eye?
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics
59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…
58 min
Baseband Exploitation in 2013
Hexagon challenges
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
60 min