Search for "crypto" returned 406 results

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
59 min

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit

Ein Streifzug durch die Fehler in der Kryptografie

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Security Nightmares
90 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.…

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

The impact of quantum computers in cybersecurity
38 min

The impact of quantum computers in cybersecurity

Estimating the costs of algorithms for attacks and defense…

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Why Railway Is Safe But Not Secure
41 min

Why Railway Is Safe But Not Secure

Security Of Railway Communication Protocols

Delta Chat messenger
19 min

Delta Chat messenger

unlocking the potential of e-mail and the web

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption