Search for "crypto" returned 403 results

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

The impact of quantum computers in cybersecurity
38 min

The impact of quantum computers in cybersecurity

Estimating the costs of algorithms for attacks and defense…

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Security Nightmares
90 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.…

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

Delta Chat messenger
19 min

Delta Chat messenger

unlocking the potential of e-mail and the web

Why Railway Is Safe But Not Secure
41 min

Why Railway Is Safe But Not Secure

Security Of Railway Communication Protocols

LatticeHacks
65 min

LatticeHacks

Fun with lattices in cryptography and cryptanalysis

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

NSA Points of Presence in AT
59 min

NSA Points of Presence in AT

Vortrag mit aktuellen Fotos aus luftigen Perspektiven