Search for "crypto" returned 403 results
58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)
59 min
Provable Security
How I learned to stop worrying and love the backdoor
56 min
Viva la Vita Vida
Hacking the most secure handheld console
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
59 min
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
Breaking and fixing the Bluetooth standard. One More Time.
30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…
54 min
Do You Think That's Funny?
Art Practice under the Regime of Anti-Terror Legislation
27 min
ANIMAL()CITY
Unleashed!
51 min
The GNU Name System
A Decentralized PKI For Social Movements
47 min
Jailbreaking iOS
From past to present
59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor
72 min
State of the Onion
Neuland
46 min
Writing secure software
using my blog as example
60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap
61 min