Search for "535" returned 2058 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Plants & Machines
26 min

Plants & Machines

Food replicating Robots from Open Source Technologies

Open Code Verlesung
44 min

Open Code Verlesung

Lesung des öffentlichen Sourcecodes

Home Distilling
28 min

Home Distilling

Theory and practice of moonshining and legal distilling

Hacking the World
26 min

Hacking the World

The struggle for security for all.

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

IFGINT
28 min

IFGINT

Erkenntnisse aus Informationsfreiheitsanfragen - Hacks,…