Cryptographic engineering

Results: 331



#Item
151Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
152Cryptographic protocols / Internet Engineering Task Force / Transmission Control Protocol / Cryptography / Man-in-the-middle attack / Public-key cryptography

RTCWeb Security Considerations IETF 81 Eric Rescorla [removed]

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2011-07-26 10:39:57
153Broadband / Teletraffic / Electronics / Cryptographic software / Tor / Onion routing / Traffic analysis / Computer network / Circuit switching / Internet privacy / Computing / Electronic engineering

Torchestra: Reducing Interactive Traffic Delays over Tor Deepika Gopal Nadia Heninger UC San Diego

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-09-10 14:35:44
154Email / Computer security / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / DomainKeys / MIME / Digital signature / Mail submission agent / Email authentication / Spam filtering / Computing

Internet Engineering Task Force (IETF) Request for Comments: 6376 Obsoletes: 4871, 5672 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-09-21 15:08:31
155Radio-frequency identification / Electronic toll collection / Cryptography / Cryptographic protocols / Wireless / Toll road / E-ZPass / Transponder / Traffic ticket / Transport / Technology / Telecommunications engineering

Automated Traffic Enforcement Which Respects “Driver Privacy” Andrew J. Blumberg University of Chicago Mathematics Department Lauren S. Keeler

Add to Reading List

Source URL: math.stanford.edu

Language: English - Date: 2006-08-09 13:02:16
156Password / Cryptographic protocols / Cryptographic nonce / Electronic engineering / Digest access authentication / Computing / Security / ZRTP / Cryptography / Videotelephony / Session Initiation Protocol

Microsoft PowerPoint - VoIP Attack

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-05 16:52:50
157Electronic engineering / Technology / Networking hardware / Wireless security / IEEE 802.11 / Cryptographic protocols / Wireless access point / Wireless router / Router / Computer network security / Computing / Wireless networking

Microsoft Word - ACCAN Securing your home or office Wi-Fi

Add to Reading List

Source URL: www.accan.org.au

Language: English - Date: 2015-01-23 00:32:12
158Cryptography / Relational database management systems / Cryptographic software / Alexander Kornbrust / Database management systems / Oracle Corporation / Oracle Database / Encryption software / Database / Data management / Software / Computing

Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust 28-July-2005

Add to Reading List

Source URL: www.red-database-security.com

Language: English - Date: 2009-05-07 08:02:06
159Internet Engineering Task Force / Internet standards / Cryptographic protocols / Network architecture / Transport Layer Security / Internet / Computing / Transmission Control Protocol

Starting on TLS 1.3 Eric Rescorla [removed] IETF 85

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2013-11-05 17:12:40
160Electronic engineering / Technology / IEEE 802.11 / Cryptographic protocols / Networking hardware / Wireless security / Wi-Fi / Wireless access point / Wireless router / Computer network security / Computing / Wireless networking

Tip Sheet Securing your home or office Wi-Fi

Add to Reading List

Source URL: www.accan.org.au

Language: English - Date: 2015-01-23 00:32:12
UPDATE