PV 204 Security technologies Trusted boot Petr venda
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you
Minerva: Loop bounds are enough
PA193 - Secure coding principles and practices Language level vulnerabilities: Buffer overflow, type overflow, strings Petr Švenda - ppt download
PV 204 Security technologies Trusted boot Petr venda
PV 204 Security technologies Trusted boot Petr venda
PDF) Fooling primality tests on smartcards
PV 204 Security technologies Trusted boot Petr venda
Research: Analysis of Trusted Platform Module chips [CRoCS wiki]
Research: Analysis of Trusted Platform Module chips [CRoCS wiki]
Petr Svenda (@rngsec) / Twitter
Tweets with replies by Matus Nemec (@MatusCrypto) / Twitter
Minerva: Loop bounds are enough
PDF) The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli
PV 204 Security technologies Trusted element side channels
PV 204 Security technologies Trusted element side channels
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you
PV 204 Security technologies Trusted boot Petr venda
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you
PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download
PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download
PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download
Petr Švenda
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you