Search for "Pau Espin" returned 59 results
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
62 min
A hacker's guide to Climate Change - What do we know and how do we know it?
An introduction to the basics of climate research and whatβ¦
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can doβ¦
61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time
55 min