Search for "kay" returned 3585 results

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

31 min
The DRM Of Pacman
Copy protection schemes of way back then and how they…

29 min
SHA2017 Closing
Five days of hacking, this is what happened. You wouldn't…

59 min
Micro Services
Vertical thinking for a simple architecture!

26 min
Learning from embedded: less is more
...or how to use any existing SUSE OS variant to meet all…

54 min
Hacking Cisco Phones
Just because you are paranoid doesn't mean your phone isn't…

55 min
White-Box Cryptography
Survey

49 min
MISP threat sharing platform
The MISP threat sharing platform is a free and open source…

55 min
A Probabilistic Trust Model for GnuPG
A new way of evaluating a PGP web of trust by using a…

52 min
Privacy Design Strategies
Doing well is good enough

46 min
Proof by Erasure
The Life of John von Neumann

47 min