Search for "kay" returned 3585 results

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

The DRM Of Pacman
31 min

The DRM Of Pacman

Copy protection schemes of way back then and how they…

SHA2017 Closing
29 min

SHA2017 Closing

Five days of hacking, this is what happened. You wouldn't…

Micro Services
59 min

Micro Services

Vertical thinking for a simple architecture!

Learning from embedded: less is more
26 min

Learning from embedded: less is more

...or how to use any existing SUSE OS variant to meet all…

Hacking Cisco Phones
54 min

Hacking Cisco Phones

Just because you are paranoid doesn't mean your phone isn't…

MISP threat sharing platform
49 min

MISP threat sharing platform

The MISP threat sharing platform is a free and open source…

A Probabilistic Trust Model for GnuPG
55 min

A Probabilistic Trust Model for GnuPG

A new way of evaluating a PGP web of trust by using a…