Search for "Naman Jain" returned 113 results

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

60 min
Check your privileges!
How to drop more of your privileges to reduce attack…

61 min
Email authentication for penetration testers
When SPF is not enough

53 min
Cryptography demystified
An introduction without maths

58 min
Angry weather ?
How human-induced climate change affects weather (& how we…

37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…

32 min
The Case for Scale in Cyber Security
Security Track Keynote

60 min
Ein Abgrund von Landesverrat
Wie es dazu kam und was daraus zu lernen ist

62 min
Kyber and Post-Quantum Crypto
How does it work?

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

36 min