Cryptographic engineering

Results: 331



#Item
91Software bugs / Cryptographic protocols / Internet protocols / Software testing / C++ / Pointer / Transport Layer Security / Valgrind / OpenSSL / Computing / Computer programming / Software engineering

SWAMP-Heartbleed-16May2014-v1.3

Add to Reading List

Source URL: continuousassurance.org

Language: English - Date: 2014-06-04 15:21:13
92Internet / Datagram Congestion Control Protocol / Transport layer / Transmission Control Protocol / Cryptographic nonce / Port / Ip / Internet protocols / Network architecture / Computing

Internet Engineering Task Force INTERNET-DRAFT draft-kohler-dccp-mobility-02.ps Expires: 25 DecemberEddie Kohler

Add to Reading List

Source URL: www.read.cs.ucla.edu

Language: English - Date: 2006-06-26 00:44:34
93Search algorithms / Computer performance / Software optimization / Cryptographic hash functions / Error detection and correction / Hash function / Trie / SHA-1 / Algorithm / Computing / Statistics / Computer programming

HyperLogLog in Practice: Algorithmic Engineering of a State of The Art Cardinality Estimation Algorithm Stefan Heule Marc Nunkesser

Add to Reading List

Source URL: stefanheule.com

Language: English - Date: 2015-01-15 03:04:25
94Scripting languages / Cryptography standards / High-level programming languages / Unix / Public-key cryptography / PKCS / Ruby / PHP / Portable Document Format / Computing / Software engineering / Computer programming

KryptoKoder Personal Cryptographic Tools MYPDFSIGNER MYDWFSIGNER

Add to Reading List

Source URL: www.kryptokoder.com

Language: English - Date: 2011-05-31 05:34:21
95Electronic commerce / Cyberwarfare / Computing / Direct Anonymous Attestation / Internet privacy / XTR / Security / Proof of knowledge / RSA / Cryptographic protocols / Public-key cryptography / Cryptography

Jack: Scalable Accumulator-based Nymble System Zi Lin Nicholas Hopper Computer Science & Engineering

Add to Reading List

Source URL: www.freehaven.net

Language: English - Date: 2011-01-03 02:35:49
96Cryptographic software / OpenSSL / SHA-2 / C / D / Computing / Computer programming / Software engineering

LibreSSL Giovanni Bechis Universit´a degli studi di Udine, Nov 29, 2014

Add to Reading List

Source URL: www.snb.it

Language: English - Date: 2014-11-29 12:45:40
97Source code / Subroutines / Cryptographic software / OpenSSL / Coccinelle / Python / Software bug / Main function / Printf format string / Computer programming / Computing / Software engineering

Finding Error Handling Bugs in OpenSSL using Coccinelle Julia Lawall∗ , Ben Laurie† , Ren´e Rydhof Hansen‡ , Nicolas Palix∗ and Gilles Muller§ ∗ University of Copenhagen, Email: {julia,npalix}@diku.dk † Goo

Add to Reading List

Source URL: pagesperso-systeme.lip6.fr

Language: English - Date: 2011-12-17 11:25:56
98Software engineering / SHA-2 / Checksum / SHA-1 / Perl / Computing / Cryptographic hash functions / Computer programming

Perl versiondocumentation - shasum NAME shasum - Print or Check SHA Checksums SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:57:42
99Information theory / Fortuna / Key management / Entropy / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptographic hash function / Key / Cryptography / Pseudorandom number generators / Randomness

Cryptography Engineering: Design Principles and Practical Applications

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-07 19:29:27
100Cryptographic protocols / Electronic commerce / Error detection and correction / Public key certificate / X.509 / Root certificate / Transport Layer Security / Hash tree / Digital signature / Cryptography / Public-key cryptography / Key management

Internet Engineering Task Force (IETF) Request for Comments: 6962 Category: Experimental ISSN: B. Laurie

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2013-06-06 16:56:32
UPDATE