Search for "crypto" returned 406 results

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Wallet Security
35 min

Wallet Security

How (not) to protect private keys

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
59 min

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses

Breaking and fixing the Bluetooth standard. One More Time.

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Privatisierung der Rechtsdurchsetzung
60 min

Privatisierung der Rechtsdurchsetzung

Was der Anti-Terror-Kampf von der Urheberrechtsdurchsetzung…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Do You Think That's Funny?
54 min

Do You Think That's Funny?

Art Practice under the Regime of Anti-Terror Legislation

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device