Search for "Sven Brauch" returned 200 results

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

Hacking the Nintendo Game & Watch
42 min

Hacking the Nintendo Game & Watch

Your princess is AES encrypted in another castle

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

WTF DJI, UAV CTF?!
43 min

WTF DJI, UAV CTF?!

A hacker's view at commercial drone security

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Self-cannibalizing AI
53 min

Self-cannibalizing AI

Artistic Strategies to expose generative text-to-image…

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

Gerechtigkeit 4.0
38 min

Gerechtigkeit 4.0

Makroökonomische Auswirkungen der Digitalisierung auf den…