Search for person "David Lange"

Little Services, Big Risks
34 min

Little Services, Big Risks

Extending capability-based security models to achieve…

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

FactHacks
76 min

FactHacks

RSA factorization in the real world

LatticeHacks
65 min

LatticeHacks

Fun with lattices in cryptography and cryptanalysis

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging