Search for "854" returned 1901 results

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Security Nightmares
90 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.…

Deconstructing a Socialist Lawnmower
56 min

Deconstructing a Socialist Lawnmower

Obsolete Technologies + Critical Material Studies in Media…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

"Fluxus cannot save the world."
57 min

"Fluxus cannot save the world."

What hacking has to do with avantgarde art of the 1960ies…

Theater und Quantenzeitalter
57 min

Theater und Quantenzeitalter

„Die Parallelwelt“- Das Schauspiel Dortmund und die…

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

NSA Points of Presence in AT
59 min

NSA Points of Presence in AT

Vortrag mit aktuellen Fotos aus luftigen Perspektiven

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…