Back to Results
First PageMeta Content
Secure communication / Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / GnuTLS / HTTP Secure / Cryptography / Cryptographic protocols / Cryptographic software


2013 IEEE Symposium on Security and Privacy Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan∗ , C´edric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , Pierre-Yves Strub‡ ∗ IN
Add to Reading List

Document Date: 2013-04-05 19:56:46


Open Document

File Size: 306,89 KB

Share Result on Facebook

Company

Sig RSAKey AppData Protocol Alert Protocol DHGroup / Oracle / Stateful AE / TLS / ENC / CBC / the AES / IMDEA Software / Microsoft / /

Currency

pence / AED / USD / /

/

Event

FDA Phase / /

Facility

Bouncy Castle / /

IndustryTerm

compression algorithm / ad hoc keyed hash algorithms / online materials / mainstream web browsers / symmetric encryption algorithm / Internet standard / sub-protocols / security protocol / minimal web clients / software security / web browsers / concrete algorithms / instance exploiting poor certificate management / deterministic fragmentation and padding algorithm / wireless communications / namely accounting / alert protocol / elliptic curve algorithms / secure communications / application-data protocol / cryptographic functionality or protocol / sample applications / web traffic / cryptographic algorithms / all protocol / web server / handshake protocol / Weak cryptographic algorithms / basic certificate management / software architecture / Internet Explorer / /

NaturalFeature

Record streams / /

Person

Pierre-Yves Strub / Alfredo Pironti / /

Position

linear writer / IND-CPA / writer / application programmer / /

Product

API AuthPlain / ICi / Bouncy Castle / F7 / M ODULAR I / We define the interface / StAE / G1 / We define / /

ProgrammingLanguage

Java / C / ML / /

RadioStation

50 KLOC / Chrome 449 / 35 KLOC / 5 KLOC / /

Technology

authenticated stream encryption / symmetric encryption algorithm / MAC algorithms / ad hoc keyed hash algorithms / application-data protocol / API / wireless communications / block cipher / rst encryption / underlying algorithms / command line interface / 450 encryption / GCM encryption / concrete algorithms / MP3 / Weak cryptographic algorithms / SSL / dynamically-configured protocols / encryption / cryptography / security protocol / four sub-protocols / public key / multi-instance authenticated encryption / Java / key exchange algorithms / compression algorithm / elliptic curve algorithms / alert protocol / MAC algorithm / simulation / Ciphersuites The Handshake protocol / cryptographic algorithms / handshake protocol / stream encryption / authenticated encryption / web server / stream cipher / RSA-based encryption / /

URL

http /

SocialTag