Search for "nba::yoh" returned 559 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Celeste
22 min

Celeste

Bringing an Indie Classic to Picosystem

Toniebox Reverse Engineering
60 min

Toniebox Reverse Engineering

Eine Musikbox für Kinder, Maker und Hacker

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Sonic Alchemy
44 min

Sonic Alchemy

Mehr als nur Lärm: Ein Sprint vom kleinen Audio-Einmaleins…

Das Diskmags-Projekt
42 min

Das Diskmags-Projekt

Frühes digitales Kulturerbe aufbereiten für Forschung und…

Snowden Effect vs. Privacy Paradox
34 min

Snowden Effect vs. Privacy Paradox

Einstellungen und Internetnutzungsverhalten im Kontext des…