Cryptographic primitive

Results: 89



#Item
41Software / IPsec / Cryptlib / SHA-1 / Packet Processing / Cryptographic primitive / Hifn / Microsoft CryptoAPI / Key size / Cryptographic software / Cryptography / Computing

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2003-06-16 01:39:22
42Software / IPsec / Cryptlib / SHA-1 / Packet Processing / Cryptographic primitive / Hifn / Microsoft CryptoAPI / Key size / Cryptographic software / Cryptography / Computing

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2003-06-16 01:39:22
43Software / IPsec / Cryptlib / SHA-1 / Packet Processing / Cryptographic primitive / Hifn / Microsoft CryptoAPI / Key size / Cryptographic software / Cryptography / Computing

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2003-06-16 01:39:22
44Software / IPsec / Cryptlib / SHA-1 / Packet Processing / Cryptographic primitive / Hifn / Microsoft CryptoAPI / Key size / Cryptographic software / Cryptography / Computing

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: www.openbsd.com

Language: English - Date: 2003-06-16 01:39:22
45Software / Internet protocols / Cryptographic protocols / IPsec / Microsoft CryptoAPI / Cryptlib / Cryptographic primitive / Kernel / Packet Processing / Computing / Cryptographic software / Cryptography

Cryptography As An Operating System Service: A Case Study ANGELOS D. KEROMYTIS Columbia University JASON L. WRIGHT and THEO DE RAADT OpenBSD Project

Add to Reading List

Source URL: www.openbsd.com

Language: English - Date: 2006-12-09 23:39:37
46Direct Anonymous Attestation / Cryptographic primitive / Personally identifiable information / Trusted Platform Module / RSA / Cryptography / Public-key cryptography / Cryptographic protocols

This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2013-03-06 18:15:10
47Secure multi-party computation / Secure two-party computation / Cryptography / Homomorphic encryption / Intelligence Advanced Research Projects Activity / Cryptographic primitive / Communications protocol / Cryptographic protocols / Data / Information

Microsoft Word - RFI SPAR-MPC[removed]docx

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
48Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
49FIPS 140-2 / Proprietary software / Advanced Encryption Standard / Security through obscurity / Cryptographic primitive / Wireless Transport Layer Security / Cryptography / Cryptographic protocols / Secure Shell

Georgia SoftWorks Security: SSH Security Risks RED FLAG WARNINGS Georgia SoftWorks

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2012-11-21 13:26:32
50Phelix / Block cipher / RC4 / Ciphertext / Symmetric-key algorithm / Cipher / Advanced Encryption Standard / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE