๐Ÿงช Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Cryptography

Cryptographic systems, protocols, and their security analysis

26
Total Entries
15
Contributors
28
Unique Tags
59
Related Tags

Top Contributors

Ajit Hatti(10) Tushar Dalvi(4) Abhilasha Vyas(1) Adhokshaj Mishra(1) Alok Vijayant(1)

Related Tags (3)


All Entries (26 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshyencryptionsecurity-architectureprivacy+2
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhurecryptography
2021-11-12TalkC0c0n Data Security and Privacy Abhilasha Vyasdata-protectionprivacyencryption+4
2020-09-18TalkC0c0n Broken Cryptography & Account Takeover Harsh Bothracryptography
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokanredteamcryptography
2018-09-06TalkGrrcon Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI Presentation Video Pranshu Bajpaicryptographyapi
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Raocryptographywebauthentication+2
2017-07-28Tool demoDefcon GibberSense Source Code Ajit Hattiopensourcecryptographyredteam+1
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shahcryptographypentestaudit+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hattisecure-codingreconnaissancecryptography+3
2017-03-30Tool demoBlackhat LAMMA 1.0 Ajit Hatticryptographypentest
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatticryptographypentestaudit+1
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatticryptographypentestaudit+1
2016-04-07WorkshopGround Zero Summit Basics to Advanced Cryptography & PKI for Penetration Testers and Auditors Ajit Hatticryptography
2015-11-05TalkGround Zero Summit Economics of Post Quantum Crypto Systems : Do we really Need it Ajit Hatticryptography
2015-11-05TalkGround Zero Summit Elliptical Curve Cryptography Aneesha Scryptography
2015-06-16TalkBlackhat The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvimobilessl
2015-05-28TalkHitb Sec Conf The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvimobilenetworkssl+1
2015-01-27TalkOwasp App Sec California The Savage Curtain : Mobile SSL Failures Tushar Dalvimobilessl
2014-11-21TalkDeepsec Mobile SSL Failures Video Tushar Dalvimobilessl
2014-11-13TalkGround Zero Summit Attacking Cryptography & PKI Implementations Ajit Hatticryptographyredteam
2014-08-22TalkC0c0n Cryptocalypse, Heart Bleed : Is our Government Listening? Ajit Hatticryptography
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishracryptographyredteam
2012-08-03TalkC0c0n Data Security Alok Vijayantdata-protectionencryptiondata-loss-prevention+4
2011-02-25TalkNullcon SSLSmart โ€“ Smart SSL Cipher Enumeration Presentation Gursev Singh Kalracryptographysslweb+2
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desaiopensourcecryptographysteganography+1