Search for "crypto" returned 403 results
69 min
OWASP ProActive Controls
Sichere Anwendungen erstellen?
57 min
Kryptographie nach Snowden
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?
59 min
Security Evaluation of Russian GOST Cipher
Survey of All Known Attacks on Russian Government…
62 min
Gestatten: The Flash
Security von Embedded Systemen pimpen - Wieso? Weshalb? Wow!
69 min
cryptocurrencies, smart contracts, etc.: revolutionary tech?
short answer: Yes!
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
59 min