USENIX

Videos from USENIX

Page 1 of 2 β€’ 41 total videos

15:42

USENIX Security '25: Formal Analysis of Apple’s iMessage PQ3 πŸ“±

USENIX
36 views
13:27

USENIX Security '24 - Efficient Lattice-Based Key Exchange

USENIX
165 views
13:49

USENIX Security '24: K-Waay - Rapid, Deniable Post-Quantum X3DH Without Ring Signatures πŸ”

USENIX
92 views
13:40

USENIX Security '24 - In-Depth Cryptographic Analysis of Delta Chat

USENIX
143 views
12:25

USENIX Security '24 - Challenges in Translating Cryptography Research into Practical Products

USENIX
148 views
15:45

OSDI '24: Microkernel Performance & Compatibility πŸš€

USENIX
1.8K views
11:47

USENIX Security '23: Breakthrough in Linear Private Set Union with Multi-Query Reverse Membership Test πŸ”’

USENIX
289 views
13:00

USENIX Security '23: TreeSync for Secure Group Messaging

USENIX
514 views
12:51

USENIX Security '23: Post-Compromise Security Taxonomy πŸ”

USENIX
63 views
11:19

USENIX Security '23: How Small Differences in Authenticated Encryption Can Impact Protocol Security πŸ”

USENIX
148 views
12:52

USENIX Security '23: In-Depth Security Analysis of MongoDB's Queryable Encryption πŸ”’

USENIX
298 views
11:28

USENIX Security '23: Analyzing Session Handling in Secure Messaging

USENIX
147 views
46:35

LISA14: Managing Operations in Hadoop Ecosystem

USENIX
33 views
12:14

Post-Quantum Cryptography with Co-Processors at USENIX Security '22

USENIX
248 views
13:16

USENIX Security '22: Innovative Single-Round Keyword PIR Using Constant-Weight Equality πŸ”

USENIX
423 views
13:05

USENIX Security '22: GAROTA β€” Advanced Root-of-Trust Architecture for Tiny Embedded Devices πŸ”’

USENIX
300 views
17:57

USENIX Security '14: Why Coarse-Grained Control-Flow Integrity Fails to Protect Your Gadgets πŸ”’

USENIX
142 views
31:33

USENIX Security '15: Strengthening TLS Security – To Pin or Not to Pin?

USENIX
32 views
21:55

USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols

USENIX
186 views
28:41

USENIX Security '16 - Analyzing Chosen Ciphertext Attacks on Apple iMessage

USENIX
186 views
39:33

USENIX Security '16: Breakthrough in Post-Quantum Key Exchange πŸ”

USENIX
468 views
5:21

SOUPS 2021: How Visualizing Encryption Shapes Perceptions of End-to-End Messaging Security πŸ”

USENIX
139 views
12:32

USENIX Security '21: Do Privacy Dashboards Help Users? Insights into Google’s My Activity Reactions πŸ”

USENIX
162 views
11:23

USENIX Security '21: Revealing Key Insights from Large-Scale Interviews on SME Cybersecurity & Attacks πŸ”

USENIX
240 views