Search for "xif" returned 2079 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…

Crypto Wars Part II
60 min

Crypto Wars Part II

The Empires Strike Back

The Maker movement meets patent law
67 min

The Maker movement meets patent law

How many windows are open in the patent fortress

The foodsaving grassroots movement
37 min

The foodsaving grassroots movement

How cooperative online structures can facilitate…

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom