Home

precedens Mart ovoce crocs tpm petr svenda Nepřímý Upřený pohled Těžba

Petr Svenda on Twitter:
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you

PV 204 Security technologies Trusted boot Petr venda
PV 204 Security technologies Trusted boot Petr venda

Petr Svenda (@rngsec) / Twitter
Petr Svenda (@rngsec) / Twitter

PV 204 Security technologies Trusted element side channels
PV 204 Security technologies Trusted element side channels

PDF) The Return of Coppersmith's Attack: Practical Factorization of Widely  Used RSA Moduli
PDF) The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli

Minerva: Loop bounds are enough
Minerva: Loop bounds are enough

PV 204 Security technologies Trusted element side channels
PV 204 Security technologies Trusted element side channels

Tweets with replies by Matus Nemec (@MatusCrypto) / Twitter
Tweets with replies by Matus Nemec (@MatusCrypto) / Twitter

Petr Svenda on Twitter:
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you

Research: Analysis of Trusted Platform Module chips [CRoCS wiki]
Research: Analysis of Trusted Platform Module chips [CRoCS wiki]

PV 204 Security technologies Trusted boot Petr venda
PV 204 Security technologies Trusted boot Petr venda

PV204 Security technologies Rootkits, reverse engineering of binary  applications, whitebox model Petr Švenda Faculty. - ppt download
PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download

PV 204 Security technologies Trusted element side channels
PV 204 Security technologies Trusted element side channels

PDF) Minerva: The curse of ECDSA nonces
PDF) Minerva: The curse of ECDSA nonces

PV204 Security technologies Rootkits, reverse engineering of binary  applications, whitebox model Petr Švenda Faculty. - ppt download
PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download

Massively Parallel Hardware Security Platform Massively Parallel Hardware  Security Platform Dan Cvr¤†ek, - [PDF Document]
Massively Parallel Hardware Security Platform Massively Parallel Hardware Security Platform Dan Cvr¤†ek, - [PDF Document]

PV 204 Security technologies Trusted boot Petr venda
PV 204 Security technologies Trusted boot Petr venda

Petr Svenda (@rngsec) / Twitter
Petr Svenda (@rngsec) / Twitter

Petr Svenda on Twitter:
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you

PV204 Security technologies File and disk encryption Milan Brož Petr Švenda  Faculty of Informatics, Masaryk University. - ppt download
PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download

PDF) Fooling primality tests on smartcards
PDF) Fooling primality tests on smartcards

Fakulta informatiky on Twitter:
Fakulta informatiky on Twitter: "Petr Švenda z #fimuni prosí o pomoc při výzkumu bezpečnosti kryptografického hardware. Postup je na https://t.co/TsYlhtAGiw. Děkujeme! https://t.co/deGSYIBPPM" / Twitter

PV 204 Security technologies Trusted boot Petr venda
PV 204 Security technologies Trusted boot Petr venda

Massively Parallel Hardware Security Platform Massively Parallel Hardware  Security Platform Dan Cvr¤†ek, - [PDF Document]
Massively Parallel Hardware Security Platform Massively Parallel Hardware Security Platform Dan Cvr¤†ek, - [PDF Document]

PV204 Security technologies - ppt download
PV204 Security technologies - ppt download

PV204 Security technologies File and disk encryption Milan Brož Petr Švenda  Faculty of Informatics, Masaryk University. - ppt download
PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download

Petr Svenda on Twitter:
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you

PV204 Security technologies - ppt download
PV204 Security technologies - ppt download

Research: Analysis of Trusted Platform Module chips [CRoCS wiki]
Research: Analysis of Trusted Platform Module chips [CRoCS wiki]

Petr Svenda (@rngsec) / Twitter
Petr Svenda (@rngsec) / Twitter

Minerva: Loop bounds are enough
Minerva: Loop bounds are enough

PV204 Security technologies File and disk encryption Milan Brož Petr Švenda  Faculty of Informatics, Masaryk University. - ppt download
PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download

Research: Analysis of Trusted Platform Module chips [CRoCS wiki]
Research: Analysis of Trusted Platform Module chips [CRoCS wiki]

PV 204 Security technologies Trusted boot Petr venda
PV 204 Security technologies Trusted boot Petr venda

ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki]
ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki]

PA193 - Secure coding principles and practices Language level  vulnerabilities: Buffer overflow, type overflow, strings Petr Švenda - ppt  download
PA193 - Secure coding principles and practices Language level vulnerabilities: Buffer overflow, type overflow, strings Petr Švenda - ppt download

Research: Analysis of Trusted Platform Module chips [CRoCS wiki]
Research: Analysis of Trusted Platform Module chips [CRoCS wiki]

CRoCS @ fi.muni.cz (@CRoCS_MUNI) / Twitter
CRoCS @ fi.muni.cz (@CRoCS_MUNI) / Twitter

Petr Švenda
Petr Švenda

Petr Svenda (@rngsec) / Twitter
Petr Svenda (@rngsec) / Twitter