Abstract is missing.
- Internet As a Source of RandomnessMarkus Brandt, Haya Shulman, Michael Waidner. [doi]
- Analyzing power consumption of TLS ciphers on an ESP32Tilo Fischer, Hendrik Linka, Michael Rademacher, Karl Jonas, Daniel Loebenberger. [doi]
- ICRC: Instant Certificate Revocation Checking using Blockchain-backed Bloom FiltersVinothkumar Nagasayanan, Elias Rohrer, Florian Tschorsch. [doi]
- Transputation: Transport Framework for Secure ComputationMarkus Brandt, Claudio Orlandi, Kris Shrishak, Haya Shulman. [doi]
- Welcome to MozillaFranziskus Kiefer. [doi]
- IntroductionDaniel Loebenberger. [doi]
- Methodology Design for Dynamic Test Method Generation via Existing Module TestsLisa Aichele, Christopher Huth. [doi]
- Horizontal SCA Attack using Machine Learning AlgorithmsIevgen Kabin, Marcin Aftowicz, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer. [doi]
- XOR Arbiter PUFs: an Empirical Approach to Input TransformationsNils Wisiol. [doi]
- Design and Analysis of Cryptographic Algorithms for AuthenticationJakob Wenzel 0001. [doi]
- Applied post-quantum cryptography for embedded systemsSoundes Marzougui. [doi]
- A Dinosaurs view on BlockchainsKlaus Kursawe. [doi]
- Towards a central, distributed and secure default cryptography parameter setKai Mindermann, Stefan Wagner 0001. [doi]
- Crypto (engineering) at MozillaFranziskus Kiefer. [doi]
- ECC Based Secure Authentication SolutionsIevgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer. [doi]
- Security Overview on Secure Encrypted VirtualizationRobert Buhren. [doi]