Spook: Sponge Based Leakage Resistant Authenticated Encryption

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

25:47
WAGE: An Authenticated Encryption with a Twist

WAGE: An Authenticated Encryption with a Twist

26:02
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Constructi...

Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Constructi...

23:25
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption

AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption

24:43
The Memory-Tightness of Authenticated Encryption

The Memory-Tightness of Authenticated Encryption

22:32
HackTheBox - Backfire

HackTheBox - Backfire

50:54
DNS Security, Record Types, and Reverse DNS

DNS Security, Record Types, and Reverse DNS

50:11
FIND HIDDEN PARAMETERS WITH THIS BURP SUITE EXTENSION | FIND HIDDEN IDOR🔥🔥

FIND HIDDEN PARAMETERS WITH THIS BURP SUITE EXTENSION | FIND HIDDEN IDOR🔥🔥

9:37
Content Security Policy \u0026 CORS Explained For Bug Bounty [ Hindi ]

Content Security Policy \u0026 CORS Explained For Bug Bounty [ Hindi ]

28:59
[HINDI] HTTP Security Headers | Content Security Policy (CSP) | Strict Transport Security (HSTS)

[HINDI] HTTP Security Headers | Content Security Policy (CSP) | Strict Transport Security (HSTS)

53:13
explore a Wordpress PHP BACKDOOR webshell

explore a Wordpress PHP BACKDOOR webshell

40:09
AI for Offensive Security: ShellGPT Installation

AI for Offensive Security: ShellGPT Installation

7:27
NetherCap: All-in-One ESP8266 W.i-F.i Penetration Tool | D.eauther, E.vil T.win, Repeater \u0026 Web UI

NetherCap: All-in-One ESP8266 W.i-F.i Penetration Tool | D.eauther, E.vil T.win, Repeater \u0026 Web UI

5:37
Create encrypted reverse shells with Socat

Create encrypted reverse shells with Socat

6:39
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers

Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers

21:43
On the Security of Sponge-type Authenticated Encryption Modes

On the Security of Sponge-type Authenticated Encryption Modes

24:47
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation

Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation

24:14
s-10: Authenticated Encryption

s-10: Authenticated Encryption

1:00:36
Cryptanalysis Results on Spook: Bringing Full-round Shadow-512 to the Light

Cryptanalysis Results on Spook: Bringing Full-round Shadow-512 to the Light

27:35
Lecture 15 - D(I)S\u0026E - SP21

Lecture 15 - D(I)S\u0026E - SP21

48:38
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers

Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers

23:04
Session on Leakage Resilience and Masking Verification

Session on Leakage Resilience and Masking Verification

1:29:54
ZMAC  A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication

ZMAC A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication

22:49
Cryptanalysis of Forkciphers

Cryptanalysis of Forkciphers

18:14
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Gu...

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Gu...

17:30
Provably Robust Sponge-Based PRNGs and KDFs

Provably Robust Sponge-Based PRNGs and KDFs

27:59
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

26:01
Isap v2.0

Isap v2.0

19:13
Security analysis of SPAKE2+

Security analysis of SPAKE2+

26:43

Recent searches