ID | Interpret | Skladba | Album | |
181. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
182. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
183. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
184. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
185. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
186. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
187. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
188. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
189. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
190. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
191. | FX of Phenoelit, fabs | Port Scanning improved | Chaos Communication Congress 2007 (24c3) | |
192. | FX of Phenoelit, fabs | Port Scanning improved | Chaos Communication Congress 2007 (24c3) | |
193. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
194. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
195. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
196. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
197. | dash | Reverse Engineering of Embedded Devices | Chaos Communication Congress 2007 (24c3) | |
198. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
199. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
200. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |