cryptona.be | We have a full scale of professional and operational services supporting the different aspects which are necessary in cryptographic applications. We assist you with the design, armor you with the right tools so you can run them yourself, and we chaparone you while you implement and operate them… | integrate cryptographic, cryptographic cyber, expert cryptographic, cryptographic solutions, necessary cryptographic | secure, certificate, vault, security, cyber | 7 |
link2trust.be | Exciting times lie ahead in the realm of cybersecurity! Today, we want to delve into the concept of crypto-agility and how it can empower organizations to fortify their security strategies against evolving threats. What is Crypto-Agility? Crypto-agility refers to an organization’s ability to… | cryptographic asset, cryptographic maturity, design cryptographic, cryptographic service, definition cryptographic | security, ahead, governance, cryptography, road | 5 |
gijsvanlaer.be | My name is Gijs Van Laer, I'm a cryptographic engineer and information security consultant. Currently, I'm working at XFA , but do not hesitate to reach out for advice or other small projects. Below you can find a few of the services I can provide, but feel free to reach out if you have any… | laer cryptographic, cryptographic engineer, cryptographic engineering | security, university, research, advice, engineer | 3 |
hunna.be | Data that has been filtered by the terminal and written to the target media is signed using a cryptographic key that is unique to each terminal. A protected system can verify the signature and integrity of data of any USB media, and deny anything that doesn’t come via specific terminals. | medium cryptographic, cryptographic key, terminal cryptographic, cryptographic signature, signature cryptographic | system, usb, sanitation, threat, security | 2 |
palmki.be | The data containing your biometric palm and the patterns of your veins is transformed into a cryptographic hash-code. This means that it is impossible to decode your biometric information for any external parties. | vein cryptographic, cryptographic hash | user, palm, pattern, access, vein | 1 |
evilwan.be | …site is not intended to educate the audience in all sorts of dangers that lie waiting on the worldwide network tubes, but rather to show random musings that are more or less related to cyber security. Topics may include forensic techniques, reverse engineering thoughts, cryptographic protocols,... | thought cryptographic, cryptographic protocol | evil, wan, file, java, naked | 1 |
julienfontaine.be | We all love to be connected to the Wi-Fi network. We secure it using the well know WPA2 encryption method, but this encryption is now vulnerable to the cryptographic attack KRACK, read more... | vulnerable cryptographic, cryptographic attack | electronic, thing, iot, fully, gateway | 1 |
hackeragenda.be | …subjects related related to to blockchains, blockchains, ranging ranging from from technical technical aspects aspects such such as as cryptographic cryptographic concepts concepts and and software software implementations implementations to to high-level high-level reflexions, reflexions… | aspect cryptographic, cryptographic concept | meetup, user, technology, php, api | 1 |
mouha.be | I support the cryptographic community by serving in various program committees and editorial boards, including IACR Transactions on Symmetric Cryptology (ToSC) and IACR Communications in Cryptology (CiC) . I’m also part of the steering committee of CFAIL . | | cryptography, researcher, overflow, attack, talk | 1 |
wavecraft.be | Engineer in electronics, Loïc van Oldeneel performed numerous jobs in scientific teaching (college and high school), university research (hardware hacking of cryptographic embedded systems), technical actions on particle accelerators and design of embedded systems for industry and museums, as a… | hack cryptographic, cryptographic system | music, sound, engineering, gear, electronic | 1 |