Tools and Techniques for Assessing the Security of Cryptographic Primitives - Maria Eichlseder UWindsor CS Colloquium 43:58 9 months ago 41 Далее Скачать
Applied Crypto 2 - L7 Tools for Cryptanalysis Maria Eichlseder 1:51:26 Streamed 4 years ago 599 Далее Скачать
Information Security 1 - Crypto 1 - Authentication Maria Eichlseder 2:22:50 Streamed 4 years ago 1 615 Далее Скачать
Information Security 2 - Crypto 2 - Encryption Maria Eichlseder 2:17:24 Streamed 4 years ago 1 153 Далее Скачать
Information Security 4 - Crypto 4 - Protocols & Applications Maria Eichlseder 2:31:31 Streamed 4 years ago 807 Далее Скачать
Information Security 3 - Crypto 3 - Asymmetric Crypto Maria Eichlseder 2:37:17 Streamed 4 years ago 840 Далее Скачать
Cryptography - L6 Symmetric Encryption Maria Eichlseder 1:54:27 Streamed 4 years ago 1 017 Далее Скачать
InfoSec L3 - Crypto 3 - Asymmetric Cryptography Maria Eichlseder 2:37:25 Streamed 3 years ago 2 358 Далее Скачать
Maria Eichlseder: SIFA Exploiting Ineffective Fault Inductions on Symmetric Cryptography Irancrypt 1:33:08 3 years ago 242 Далее Скачать
InfoSec L1 - Crypto 1 - Authentication Maria Eichlseder 2:16:38 Streamed 3 years ago 4 371 Далее Скачать
7 Cryptography Concepts EVERY Developer Should Know Fireship 11:55 3 years ago 1 416 096 Далее Скачать
Cryptography - L7 Factoring-based Asymmetric Cryptography Maria Eichlseder 1:48:25 Streamed 4 years ago 875 Далее Скачать
27c3: Automatic Identification of Cryptographic Primitives in Software (en) Christiaan008 51:22 13 years ago 311 Далее Скачать
HEROES OF TECH - IAIK Institute | Maria Eichlseder & Sujoy SINHA ROY Silicon Alps 4:32 2 years ago 573 Далее Скачать