| | Invasive Computing (uni-erlangen.de) |
|
1 point by tpush on April 27, 2018 | past
|
| | Tresor – CPU-only AES implementation resistant to RAM cold-boot attacks (2011) (uni-erlangen.de) |
|
87 points by whitehat2k9 on Feb 2, 2016 | past | 14 comments
|
| | Android Full Disk Encryption Cold Boot Attack (2012) (uni-erlangen.de) |
|
107 points by louis-paul on Jan 4, 2016 | past | 49 comments
|
| | “Simple” performance modeling: The Roofline Model [pdf] (uni-erlangen.de) |
|
1 point by nkurz on July 16, 2014 | past
|
| | TRESOR Runs Encryption Securely Outside RAM (uni-erlangen.de) |
|
112 points by jgrahamc on Sept 27, 2013 | past | 65 comments
|
| | Linux kernel automatic tailored configuration generation (uni-erlangen.de) |
|
2 points by lockmovdwordptr on Aug 28, 2013 | past
|
| | FROST: Forensic Recovery Of Scrambled Telephones (uni-erlangen.de) |
|
4 points by arantius on March 6, 2013 | past | 1 comment
|
| | Forensic Recovery Of Scrambled Telephones (uni-erlangen.de) |
|
3 points by anigbrowl on Feb 21, 2013 | past
|
| | Forensic Recovery Of Scrambled Android Phones (uni-erlangen.de) |
|
3 points by kram8 on Feb 18, 2013 | past
|
| | Cold boot attack against Android phones (uni-erlangen.de) |
|
3 points by sweis on Feb 14, 2013 | past
|
| | Prevent cold boot attacks using TRESOR (uni-erlangen.de) |
|
29 points by thomas-st on Sept 1, 2012 | past | 10 comments
|
| | TRESOR Runs AES Securely Outside RAM (uni-erlangen.de) |
|
35 points by blasdel on Dec 31, 2011 | past | 20 comments
|
| | Early Lisp History (1956-1959) (uni-erlangen.de) |
|
3 points by groovy2shoes on Sept 29, 2011 | past
|
| | An interactive approach to the fascinating world of quantum physics (uni-erlangen.de) |
|
1 point by gsivil on Aug 21, 2011 | past
|
| | Tresor Runs Encryption Securely Outside RAM (uni-erlangen.de) |
|
63 points by there on May 30, 2011 | past | 23 comments
|
| | McCarthy and Lisp: The Influence of the Designer on the Design (uni-erlangen.de) |
|
2 points by gnosis on Jan 17, 2011 | past
|