Search for "cy" returned 5947 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

A short political history of acoustics
49 min

A short political history of acoustics

For whom, and to do what, the science of sound was…

Policing the Romantic Crowd
38 min

Policing the Romantic Crowd

Velocipedes and Face Recognition

OWASP ProActive Controls
69 min

OWASP ProActive Controls

Sichere Anwendungen erstellen?

Our Time in a Product Review Cabal
41 min

Our Time in a Product Review Cabal

And the malware and backdoors that came with it.