Search for "Hedi" returned 101 results

36 min
A Blockchain Picture Book
Blockchain origins and related buzzwords, described in…

63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

62 min
Kyber and Post-Quantum Crypto
How does it work?

37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…

61 min