USENIX

Videos from USENIX

Page 1 of 2 • 32 total videos

USENIX Security '24 - Efficient Lattice-Based Key Exchange
13:27

USENIX Security '24 - Efficient Lattice-Based Key Exchange

USENIX
165 views
USENIX Security '24 - K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
13:49

USENIX Security '24 - K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures

USENIX
92 views
USENIX Security '24 - In-Depth Cryptographic Analysis of Delta Chat
13:40

USENIX Security '24 - In-Depth Cryptographic Analysis of Delta Chat

USENIX
143 views
USENIX Security '24 - Challenges in Translating Cryptography Research into Practical Products
12:25

USENIX Security '24 - Challenges in Translating Cryptography Research into Practical Products

USENIX
148 views
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
11:47

USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test

USENIX
289 views
USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...
11:19

USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...

USENIX
148 views
USENIX Security '23 - Security Analysis of MongoDB Queryable Encryption
12:52

USENIX Security '23 - Security Analysis of MongoDB Queryable Encryption

USENIX
298 views
Post-Quantum Cryptography with Co-Processors at USENIX Security '22
12:14

Post-Quantum Cryptography with Co-Processors at USENIX Security '22

USENIX
248 views
USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality
13:16

USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality

USENIX
423 views
USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow
17:57

USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow

USENIX
142 views
USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
31:33

USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections

USENIX
32 views
USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols
21:55

USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols

USENIX
186 views
USENIX Security '16 - Analyzing Chosen Ciphertext Attacks on Apple iMessage
28:41

USENIX Security '16 - Analyzing Chosen Ciphertext Attacks on Apple iMessage

USENIX
186 views
USENIX Security '16 - Post-quantum Key Exchange—A New Hope
39:33

USENIX Security '16 - Post-quantum Key Exchange—A New Hope

USENIX
468 views
SOUPS 2021 - On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
5:21

SOUPS 2021 - On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security

USENIX
139 views
USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...
12:32

USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...

USENIX
162 views
USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...
11:23

USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...

USENIX
240 views
SOUPS 2020 - Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations
5:01

SOUPS 2020 - Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations

USENIX
103 views
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
11:15

USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks

USENIX
817 views
USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...
10:41

USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...

USENIX
668 views
USENIX Security '20 - The Impact of Requirements and Developer Practices on Application Security
11:11

USENIX Security '20 - The Impact of Requirements and Developer Practices on Application Security

USENIX
239 views
USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
12:11

USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers

USENIX
181 views
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
12:17

USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks

USENIX
272 views
FOCI '20 - Identifying Disinformation Websites Using Infrastructure Features
10:45

FOCI '20 - Identifying Disinformation Websites Using Infrastructure Features

USENIX
157 views