Search for "Udo Vetter" returned 1133 results
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
59 min
Security of the IC Backside
The future of IC analysis
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
64 min
Decoding the LoRa PHY
Dissecting a Modern Wireless Network for the Internet of…
56 min
Reality Check! Basel/Lagos?? In virtual reality?
An African tale of art, culture and technology
53 min
Cryptography demystified
An introduction without maths
33 min
Rebel Cities
Towards A Global Network Of Neighbourhoods And Cities…
61 min
Vacuum robot security and privacy
prevent your robot from sucking your data
38 min
Content take-downs: Who cleans the internet?
EU plans to swipe our freedom of expression under the carpet
60 min
the possibility of an army
phone verified accounts bringing the Hessian army back to…
66 min
The Snowden Refugees under Surveillance in Hong Kong
A Rapidly Emerging Police State and Imminent Deportation to…
60 min
Boeing 737MAX: Automated Crashes
Underestimating the dangers of designing a protection system
95 min
Platform System Interface
Design und Evaluation holistischer Computerarchitektur
42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…
32 min
The Universe Is, Like, Seriously Huge
Stuff in Space Is Far Away – but How Do We Know?
33 min
Interplanetary Colonization
the state at the beginning of the 21st Century
51 min
How to drift with any car
(without your mom yelling at you)
61 min