Search for "Aiko " returned 71 results

62 min
Kyber and Post-Quantum Crypto
How does it work?

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

36 min
A Blockchain Picture Book
Blockchain origins and related buzzwords, described in…

61 min
Email authentication for penetration testers
When SPF is not enough

44 min
Exploiting PHP7 unserialize
teaching a new dog old tricks

62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…

37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

40 min
An introduction to Firmware Analysis
Techniques - Tools - Tricks

46 min