Cryptography

Title Speakers Conference Tags
Security Evaluation of Russian GOST Cipher Nicolas T Courtois Chaos Communication Congress-29 - Hamburg, Germany Cryptography Attack GOST
POWER ANALYSIS ATTACKS FOR CHEAPSKATES "colin O'flynn" Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Cryptography Attack Differential Power Analysis
SHA-3 Jean-Philippe Aumasson Hashdays-2012 - Lucerne,Switzerland Cryptography Standards SHA-3
REVERSE ENGINEERING A MASS TRANSIT TICKETING SYSTEM Trainhack Ruxcon-2012 - Melbourne, Australia Reverse Engineering Cryptography Attack
TORTURING OPENSSL Valeria Bertacco BlackHat USA-2012 - Las Vegas, USA Cryptography OpenSSL Key recovery
Deniability in messaging protocols Gregor Kopf , Bernhard Brehm CONFidence-2012 - Krakow, Poland Cryptography
[Cryptographic Function Identification in Obfuscated Binary Programs] Joan Calvet Hackito Ergo Sum-2012 - Paris, France Reverse Engineering Cryptography
Mackerel: A Progressive School Of Cryptographic Thought Justin Troutman CarolinaCon-7 - Raleigh, USA Security Cryptography
How Cryptography Can Rescue The Web Carlos Ribeiro OWASP IBWAS-2010 - Portugal Web Keynote Cryptography
Open-Source Cryptographic Libraries And Embedded Platforms Pascal Junod hashdays-2010 - Lucerne, Switzerland Security Others Cryptography
Cryptography Vs Steganography Eduardo Ruiz Duarte BugCon-2010 - Mexico Cryptography
Keynote: The Changing Face Of Cryptography Fred Piper OWASP Dublin-2010 - Ireland Keynote Cryptography
Aura Software Security / Xero - Tales From The Crypt0 Graeme Neilson , Kirk Jackson OWASP New Zealand-2010 - New Zealand Security Others Cryptography
Cryptographic Agility: Defending Against The Sneakers Scenario Bryan Sullivan Blackhat USA-2010 - Las Vegas, USA Security Cryptography
Bad Memories Elie Bursztein , Baptiste Rydstedt Blackhat USA-2010 - Las Vegas, USA Security Cryptography
Legic Prime: Obscurity In Depth Henryk Plötz Chaos Communication Congress-26 - Berlin, Germany Security Cryptography
“Yes We Can’T!” - On Kleptography And Cryptovirology Moti Yung Chaos Communication Congress-26 - Berlin, Germany Security Cryptography Malware
Exposing Crypto Bugs Through Reverse Engineering Philippe Oechslin Chaos Communication Congress-26 - Berlin, Germany Security Cryptography
How You Can Build An Eavesdropper For A Quantum Cryptosystem Qin Liu Chaos Communication Congress-26 - Berlin, Germany Security Cryptography
Trusted Cryptography Vincent Rijmen BruCON-2009 - Brussels, Belgium Cryptography
Hash Functions And Their Many Uses In Cryptography Shai Halevi 18th USENIX Security Symposium-2009 - Montreal, Canada Security Cryptography
Practical Symmetric Key Cryptography On Modern Graphics Hardware Owen Harrison , John Waldron 17th USENIX Security Symposium-2008 - San Jose, USA Security Cryptography
The (Im)Possibility Of Hardware Obfuscation Karsten Nohl The Last HOPE-2008 - USA Security Cryptography
Pgp Versus Pki Laura Raderman The Last HOPE-2008 - USA Security Cryptography
Straight Talk About Cryptography Jon Callas TROOPERS-2008 - Munich, German Cryptography
Quantum Cryptography And Possible Attacks Alexander Ling , Antia Lamas , Christian Kurtsiefer , Ilja Gerhardt Chaos Communication Congress-24 - Berlin, Germany Security Cryptography
Elastic Block Ciphers In Practice: Constructions And Modes Of Encyption Debra L. Cook EC2ND-2007 - Heraklion, Greece Cryptography
Three Crypto Geeks On The Current State Of Cryptography And The Internet Jon Laurie , Rodney Thayer ShmooCon-2007 - Washington DC, USA Security Cryptography
Mosref: Using Cryptography And Injectable Virtual Machines In Security Wes Brown HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Cryptography
Taming Bugs: The Art And Science Of Writing Secure Code Paul Boehm HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Cryptography
Presentation Title: Carlos Sarraute HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Analysis Cryptography
Academic Department Or Corporate Lab, Which Fits? Bill Aiello 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Cryptography
Quantum Cryptography And Computation Syzygy HOPE Number 6-2006 - USA Security Cryptography
The Life And Times Of Alan Turing, Father Of The Computer Karamoon HOPE Number 6-2006 - USA Security Cryptography
Quantum Entanglement Stephanie Wehner Chaos Communication Congress-22 - Berlin, Germany Security Cryptography
Old Skewl Hacking-Infrared - How To Break Into The Hotel System Major Malfunction SyScan-2005 - Singapore Security Privacy Cryptography Legal
/Applied Cryptography/? Oh, I Skimmed Through That Book Once. Seth Hardy ShmooCon-2005 - Washington DC, USA Cryptography
Aspects Of Elliptic Curve Cryptography Florian Heß Chaos Communication Congress-21 - Berlin, Germany Security Cryptography
Nuclear Weapons, Permissive Action Links, And The History Of Public Key Cryptography (Pdf) Steve Bellovin 13th USENIX Security Symposium-2004 - San Diego, USA Security Cryptography
The Cryptophone Rop Gonggrijp , Barry Wels The Fifth HOPE -2004 - USA Security Cryptography
Cryptography Demystified Suresh Ramasamy HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Cryptography
Cryptography Matt Blaze 12th USENIX Security Symposium-2003 - Washington DC, USA Security Cryptography
Security Issues In P2P File Distribution Bram Cohen Blackhat Europe-2003 - Amsterdam, The Netherlands Security Cryptography
Will People Ever Pay For Privacy? Adam Shostack Blackhat Europe-2003 - Amsterdam, The Netherlands Security Privacy Cryptography
Cryptography And Steganography Elonka Dunin DEF CON-10 - Las Vegas, USA Security Cryptography
Crypto For The Masses Matt Blaze , Greg Newby , Anatole Shaw H2K2-2002 - USA Security Panel Cryptography
Cryptographical Solutions For Wireless Devices Rop Gonggrijp Chaos Communication Congress-18 - Berlin, Germany Security Wireless Cryptography
Elliptic Curve Cryptography (Ecc) Christine Priplata , Colin Stahlke Chaos Communication Congress-18 - Berlin, Germany Security Cryptography
Smart Card Security Marc Witteman Blackhat Europe-2001 - Amsterdam, The Netherlands Security Access Cryptography
Changes In Deployment Of Cryptography, And Possible Causes Eric Murray 10th USENIX Security Symposium-2001 - Washington DC, USA Security Cryptography
Defending Against Statistical Steganalysis Niels Provos 10th USENIX Security Symposium-2001 - Washington DC, USA Security Cryptography
Cypherpunk Grade Covert Network Channels Jason Peel DEF CON-09 - Las Vegas, USA Security Cryptography Network
The Practical Use Of Cryptography In Human Rights Groups Suelette Dreyfus 9th USENIX Security Symposium-2000 - Denver, USA Security Cryptography
Why Cryptography Is Harder Than It Looks, Part Two Sameer Parekh Blackhat USA-2000 - Las Vegas, USA Security Cryptography
Cryptography And The Internet Steven M. Bellovin 8th USENIX Security Symposium-1999 - Washington DC, USA Security Cryptography
U.S. Crypto Policy: Explaining The Inexplicable Susan Landau 8th USENIX Security Symposium-1999 - Washington DC, USA Security Cryptography
Mistakes And Blunders: A Hacker Looks At Cryptography Bruce Schneier Blackhat USA-1999 - Las Vegas, USA Security Cryptography
Mistakes And Blunders: A Hacker Looks At Cryptography. Bruce Schneier Blackhat USA-1998 - Las Vegas, USA Security Cryptography Business
Why Cryptography Is Harder Than It Looks Bruce Schneier DEF CON-05 - Las Vegas, USA Security Cryptography
Why Cryptography Is Harder Than It Looks, Part Two Sameer Parekh DEF CON-05 - Las Vegas, USA Security Cryptography
Compliance Defects In Public Key Cryptography Don Davis 6th USENIX Security Symposium-1996 - San Jose, USA Security Cryptography Compliance
Cryptolib: Cryptography In Software John B. Lacy 4th UNIX Security Symposium-1993 - Santa Clara, USA Security Cryptography