Security of RSA and Integer Factorization

6 years ago 4400 Views

Requirements driven Model-based Testing

6 years ago 325 Views

RSA cracking puzzle

6 years ago 2500 Views

On deriving the private key from a public key

6 years ago 3045 Views

Software Architecture

6 years ago 17772 Views

Integer security analysis using smt solver

6 years ago 828 Views

Exploiting Cryptographic Misuse - An Example

7 years ago 1248 Views

Linux binary analysis and exploitation

7 years ago 1080 Views

Load-time Hacking using LD_PRELOAD

10 years ago 2892 Views

Interface-Implementation Contract Checking

10 years ago 604 Views

Ivv workshop model-based-testing-of-nasa-systems

10 years ago 618 Views

Reverse Engineering of Software Architecture

11 years ago 4933 Views

Explaining my Phd Thesis to layman

11 years ago 702 Views