Search for "crypto" returned 403 results
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
38 min
The impact of quantum computers in cybersecurity
Estimating the costs of algorithms for attacks and defense…
55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks
90 min
Security Nightmares
Damit Sie auch morgen schlecht von Ihrem Computer träumen.…
55 min
The DROWN Attack
Breaking TLS using SSLv2
58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures
63 min
goto fail;
exploring two decades of transport layer insecurity
19 min
Delta Chat messenger
unlocking the potential of e-mail and the web
41 min
Why Railway Is Safe But Not Secure
Security Of Railway Communication Protocols
65 min
LatticeHacks
Fun with lattices in cryptography and cryptanalysis
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
59 min