Search for "Jack Random"
prev
next
30 min
How much can we trust science in light failed replications,…
60 min
Efail, other attacks and lessons learned.
61 min
Reverse engineering a train to analyze a suspicious…
57 min
An introduction into reverse-engineering x86 microcode and…
42 min
Your princess is AES encrypted in another castle
61 min
How Astronomy Knew 6 Planets, Then Found 20 More, Then Went…
59 min
Shamir secret sharing: How it works and how to implement it
54 min
An introduction to reverse engineering network protocols
59 min
Let's understand how the scientific system works
62 min
Pure capability-based security for UNIX
38 min
Estimating the costs of algorithms for attacks and defense…
45 min
the first three years of a six month project.
prev
next