First Page | Document Content | |
---|---|---|
![]() Date: 2014-12-03 18:45:56USB Finite fields Kingston Technology Block cipher USB flash drive Elliptic curve cryptography Comparison of encrypted external drives Aloaha Cryptography Disk encryption Advanced Encryption Standard | Add to Reading List |
![]() | USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of AdelaideDocID: 1xVSr - View Document |
![]() | arXiv:1708.09114v1 [cs.CR] 30 AugFirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution Grant Hernandez∗DocID: 1xVC4 - View Document |
![]() | PDF DocumentDocID: 1xSo5 - View Document |
![]() | PDF DocumentDocID: 1xScN - View Document |
![]() | PDF DocumentDocID: 1xQHp - View Document |