Beruflich Dokumente
Kultur Dokumente
Application analysis
Banking security
Chip and PIN (EMV) security, ATM
phantom withdrawals
Biometric identification
iris recognition, biometric cryptography
Security protocols
Compromising emanations
eavesdropping risks of video displays,
soft tempest, compromising video
emanations signal processor
Cryptology (publications)
block ciphers (Serpent, BEAR, LION,
TEA, XTEA), stream ciphers
(Chameleon), hash functions (Tiger)
Electronic commerce
Anonymous communication
API security
Deterrence of deception
Hardware security
microcontroller security, FPGAs, semiinvasive attacks on depackaged
semiconductor circuits, PIN mailer
security