Search for "Victor Toso"
next
49 min
Security notions, proofs and attacks using dependently…
22 min
Revolution in selbstgehosteten Karten
34 min
modular and precise resource management
60 min
Prejudice in Word Embeddings
65 min
Fun with lattices in cryptography and cryptanalysis
41 min
Security Of Railway Communication Protocols
61 min
fun(ctional) operating system and security protocol…
57 min
An introduction into reverse-engineering x86 microcode and…
50 min
An open-hardware bipedal walking machine
60 min
Decentralizing semiconductor manufacturing
42 min
Finishing off the Nintendo DSi
next