Episode 23: Psychic Signatures in Java!

Episode 23: Psychic Signatures in Java!

Suivant

Episode 24: CryptoHack's Collection of Cryptic Conundrums!

For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and a ...  Afficher plus

Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!

Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been w ...  Afficher plus

Épisodes Recommandés

S15:E6 - What is cryptography and how to get into it (Marcus Carey)
CodeNewbie

In this episode, we talk about cryptography with Marcus Carey, enterprise architect at ReliaQuest. Marcus talks about going to the military and learning cryptography, what cryptography is, and the foundational things you need to know in order to make sure the apps you’re building ...  Afficher plus

How Does Historical Cryptology Work?
BrainStuff

To crack ciphers written centuries ago, historical cryptologists have to be half artist, half accountant, and use some of the most powerful computing tools known today. Learn how a team cracked Mary, Queen of Scots's code in this episode of BrainStuff, based on this article: http ...  Afficher plus

How to Protect your Data in the Quantum Era ?
Machine Learning

Podcast with Gautam Siwach and Jin Vanstee ! Speaker - Thomas Harrer , Thomas is an IBM distinguished engineer and CTO for server storage in Europe, Middle East and Africa. His experience is around Hybrid Cloud & AI Platform, Infrastructure for mission critical systems, Cyber Res ...  Afficher plus

Using bidirectionality override characters to obscure code. [Research Saturday]
CyberWire Daily

Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ...  Afficher plus