Search for "nba::yoh" returned 559 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

Household, Totalitarianism and Cyberspace
56 min

Household, Totalitarianism and Cyberspace

Philosophical Perspectives on Privacy Drawing on the…

Iridium Update
56 min

Iridium Update

more than just pagers

Methodisch inkorrekt!
115 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 34C3

What does Big Brother see, while he is watching?
60 min

What does Big Brother see, while he is watching?

Uncovering images from the secret Stasi archives.