USENIX
Videos from USENIX
Page 1 of 2 • 32 total videos

13:27
USENIX Security '24 - Efficient Lattice-Based Key Exchange
USENIX
165 views

13:49
USENIX Security '24 - K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
USENIX
92 views

13:40
USENIX Security '24 - In-Depth Cryptographic Analysis of Delta Chat
USENIX
143 views

12:25
USENIX Security '24 - Challenges in Translating Cryptography Research into Practical Products
USENIX
148 views

11:47
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
USENIX
289 views

11:19
USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...
USENIX
148 views

12:52
USENIX Security '23 - Security Analysis of MongoDB Queryable Encryption
USENIX
298 views

12:14
Post-Quantum Cryptography with Co-Processors at USENIX Security '22
USENIX
248 views

13:16
USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality
USENIX
423 views

17:57
USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow
USENIX
142 views

31:33
USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
USENIX
32 views

21:55
USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols
USENIX
186 views

28:41
USENIX Security '16 - Analyzing Chosen Ciphertext Attacks on Apple iMessage
USENIX
186 views

39:33
USENIX Security '16 - Post-quantum Key Exchange—A New Hope
USENIX
468 views

5:21
SOUPS 2021 - On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
USENIX
139 views

12:32
USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...
USENIX
162 views

11:23
USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...
USENIX
240 views

5:01
SOUPS 2020 - Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations
USENIX
103 views

11:15
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
USENIX
817 views

10:41
USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...
USENIX
668 views

11:11
USENIX Security '20 - The Impact of Requirements and Developer Practices on Application Security
USENIX
239 views

12:11
USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
USENIX
181 views

12:17
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
USENIX
272 views

10:45
FOCI '20 - Identifying Disinformation Websites Using Infrastructure Features
USENIX
157 views