Hacker News new | past | comments | ask | show | jobs | submit | from login
Invasive Computing (uni-erlangen.de)
1 point by tpush on April 27, 2018 | past
Tresor – CPU-only AES implementation resistant to RAM cold-boot attacks (2011) (uni-erlangen.de)
87 points by whitehat2k9 on Feb 2, 2016 | past | 14 comments
Android Full Disk Encryption Cold Boot Attack (2012) (uni-erlangen.de)
107 points by louis-paul on Jan 4, 2016 | past | 49 comments
“Simple” performance modeling: The Roofline Model [pdf] (uni-erlangen.de)
1 point by nkurz on July 16, 2014 | past
TRESOR Runs Encryption Securely Outside RAM (uni-erlangen.de)
112 points by jgrahamc on Sept 27, 2013 | past | 65 comments
Linux kernel automatic tailored configuration generation (uni-erlangen.de)
2 points by lockmovdwordptr on Aug 28, 2013 | past
FROST: Forensic Recovery Of Scrambled Telephones (uni-erlangen.de)
4 points by arantius on March 6, 2013 | past | 1 comment
Forensic Recovery Of Scrambled Telephones (uni-erlangen.de)
3 points by anigbrowl on Feb 21, 2013 | past
Forensic Recovery Of Scrambled Android Phones (uni-erlangen.de)
3 points by kram8 on Feb 18, 2013 | past
Cold boot attack against Android phones (uni-erlangen.de)
3 points by sweis on Feb 14, 2013 | past
Prevent cold boot attacks using TRESOR (uni-erlangen.de)
29 points by thomas-st on Sept 1, 2012 | past | 10 comments
TRESOR Runs AES Securely Outside RAM (uni-erlangen.de)
35 points by blasdel on Dec 31, 2011 | past | 20 comments
Early Lisp History (1956-1959) (uni-erlangen.de)
3 points by groovy2shoes on Sept 29, 2011 | past
An interactive approach to the fascinating world of quantum physics (uni-erlangen.de)
1 point by gsivil on Aug 21, 2011 | past
Tresor Runs Encryption Securely Outside RAM (uni-erlangen.de)
63 points by there on May 30, 2011 | past | 23 comments
McCarthy and Lisp: The Influence of the Designer on the Design (uni-erlangen.de)
2 points by gnosis on Jan 17, 2011 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: