Theme Selector
Filter by
No Results Found, Please Adjust Your Search
Cybersecurity
DROIDCCT: Cryptographic Compliance Test via Trillion-Scale Measurement
ACSAC 2025
cryptography
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
CHES 2024
cryptography
Hybrid Post-Quantum Signatures in Hardware Security Keys
ACNS 2023
cybersecurity
Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
RSA 2022
cybersecurity
Deep-Cryptanalysis - Fashion or Revolution?
WAC 2021
cryptography
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Jun 2021
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
May 2021
cryptography
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
Defcon & BH 2020
cryptography
A Hacker Guide To Deep Learning Based Side Channel Attacks
Defcon 2019
security
The first collision for full SHA-1
Crypto 2017
security
How we created the first SHA-1 collision and what it means for hash security
Black Hat 2017
web security
Understanding the prevalence of web traffic interception
Jun 2017
web security
The Security Impact of HTTPS Interception
NDSS 2017
network security
How email in transit can be intercepted using dns hijacking
Jan 2016
network security
Understanding how tls downgrade attacks prevent email encryption
Dec 2015
web security
Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities
Mar 2013
web security
Evolution of the https lock icon (infographic)
Nov 2011
web security
Reclaiming the blogosphere talkback a secure linkback protocol for weblogs
ESORICS 2011
hacking
Beyond files recovery owade cloud-based forensic
Black hat 2011
video game
Openconflict preventing real time map hacks in online games
S&P 2011
security
Kamouflage loss-resistant password management
ESORICS 2010
hacking
Recovering windows secrets and efs certificates offline
WOOT 2010
security
Reversing dpapi and stealing windows secrets offline
Black Hat DC 2010