πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Encryption

Focus Areas: πŸ”’ Data Privacy & Protection πŸ”‘ Cryptography
33
Total Entries
29
Contributors

Top Contributors

Ajit Hatti(9) Abhilasha Vyas(1) Adhokshaj Mishra(1) Alok Vijayant(1) Altaf Shaik(1)

All Entries (33 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2024-09-20Talk44con Unveiling the ghosts of mobile networks: When will old bugs die? Video Altaf Shaik#5g#authentication#encryption+3
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeran#blueteam#application-hardening#secure-coding+2
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshy#encryption#architecture#data-protection+1
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhure, Shain Singh#encryption#quantum-computing#secure-development+3
2021-11-12TalkC0c0n Data Security and Privacy Abhilasha Vyas#data-protection#encryption#data-loss-prevention+3
2020-09-18TalkC0c0n Broken Cryptography & Account Takeover Harsh Bothra#encryption#ssl#security-testing+2
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokan, Lachlan Gunn, Ricardo Vieitez Parra#red-teaming#encryption#threat-modeling+1
2018-09-06TalkGrrcon Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI Presentation Video Pranshu Bajpai, Richard Enbody#encryption#ransomware#dynamic-analysis+1
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Rao, Thanh Bui#encryption#authentication#ipc+1
2017-07-28Tool demoDefcon GibberSense Source Code Ajit Hatti#encryption#red-teaming#security-assessment
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shah#encryption#security-assessment#audit+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hatti#secure-coding#reconnaissance#encryption+3
2017-06-24TalkLehack When encryption is not enough: Attacking Wearable - Mobile communication over BLE Presentation Video Sumanth Naropanth, Eliza Chelleng, Kavya Racharla#bluetooth#device-security#encryption+3
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-02-14TalkRsac Side-Channel Resistant Implementations Praveen Vadnala#side-channel-attacks#embedded-security#encryption
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatti#encryption#security-assessment#audit+1
2015-11-05TalkGroundzerosummit Economics of Post Quantum Crypto Systems : Do we really Need it Ajit Hatti#encryption#quantum-computing#security-strategy+1
2015-11-05TalkGroundzerosummit Elliptical Curve Cryptography Aneesha S#encryption#elliptic-curve-cryptography#secure-development+1
2015-03-03Award FREAK Attack Source Code Karthikeyan Bhargavan, Mi Tls Team#ssl#encryption#vulnerability-discovery
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-08-22TalkC0c0n Cryptocalypse, Heart Bleed : Is our Government Listening? Ajit Hatti#encryption#ssl#cyber-law+3
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2012-08-03TalkC0c0n Data Security Alok Vijayant, S Bhansali#data-protection#encryption#data-loss-prevention+3
2012-03-15TalkGrrcon SCADA Security: Why is it so hard? Video Amol Sarwate#scada#ics-security#authentication+2
2011-09-07TalkSecuritybyte Data Protection Dipankar Roy#blueteam#data-loss-prevention#data-protection+1
2011-09-06TalkSecuritybyte Private Internet Circuits - Towards A Next Generation Internet Presentation Sanjay Deshpande#network-architecture#encryption#network-defense
2011-02-25TalkNullcon SSLSmart – Smart SSL Cipher Enumeration Presentation Gursev Singh Kalra#encryption#ssl#security-assessment
2010-02-25TalkNullcon Quantum Computing Challenges in the field of security Whitepaper Navin Pai#quantum-computing#security-strategy#threat-modeling+3
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desai#encryption#steganography#blueteam
2007-12-09TalkClubhack Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? Presentation Chetan Gupta#forensics#windows#data-loss-prevention+4