Search for "Sec" returned 2697 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Demoscene now and then
41 min

Demoscene now and then

The demoscene is an underground computer art culture.

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Digitale Rohstoffe erhalten sich anders
37 min

Digitale Rohstoffe erhalten sich anders

Über Ampeln und den Erhalt eines Rohstoffes namens Software

Apple's iPhone 15: Under the C
36 min

Apple's iPhone 15: Under the C

Hardware hacking tooling for the new iPhone generation

Vacuum robot security and privacy
61 min

Vacuum robot security and privacy

prevent your robot from sucking your data

Extended DNA Analysis
31 min

Extended DNA Analysis

Political pressure for DNA-based facial composites

Free Electron Lasers
59 min

Free Electron Lasers

...or why we need 17 billion Volts to make a picture.

Firebird Open Source Database Quick Start
58 min

Firebird Open Source Database Quick Start

Why Firebird is a powerful alternative database system

Self-cannibalizing AI
53 min

Self-cannibalizing AI

Artistic Strategies to expose generative text-to-image…

What is this? A machine learning model for ants?
40 min

What is this? A machine learning model for ants?

How to shrink deep learning models, and why you would want…

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…