Cryptographic software

Results: 2705



#Item
11Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
12Software / Computing / Cross-platform software / CURL / Web scraping / Cryptographic protocols / Secure communication / Perl / Application programming interface / HTTPS / Web API

Developing and Testing Web APIs From a curl one-liner to a MooseX::App German Perl Workshop 2015, Dresden/Germany Daniel Böhmer Freelance Software Developer, Perl since 2010

Add to Reading List

Source URL: www.daniel-boehmer.de

Language: English - Date: 2015-05-07 04:01:29
13Software / System software / Secure Shell / Cryptographic software / Utility software / FreeIPA / OpenSSH / Comparison of SSH servers / Key management / IPA

FreeIPA Training Series SSH Public Keys in FreeIPA Jan Cholasta

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-06-06 07:15:16
14Cryptography / Software engineering / E-commerce / RSA / Secure multi-party computation / ALGOL 68 / Const / Method / Public-key cryptography / Apache Avro

L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2009-09-30 17:02:37
15Computer access control / Cryptography / Software / Password / Security / Cryptographic software / Random password generator / Passwd / Passphrase / Keeper / Crypt / KeePass

Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

Add to Reading List

Source URL: library.ccsu.edu

Language: English - Date: 2010-07-26 11:08:41
16Software / Computing / System software / Internet Standards / Cryptographic protocols / Cross-platform software / Simple Authentication and Security Layer / Email authentication / Red Hat / CRAM-MD5 / Generic Security Services Application Program Interface / Cygwin

GNU SASL Simple Authentication and Security Layer for the GNU system for version 1.7.0, 22 October 2010 Simon Josefsson

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2015-08-11 16:46:22
17Cryptography / Public key infrastructure / Email authentication / Public-key cryptography / Cryptographic software / Email encryption / Encryption / Email client / Email / Cipher / Draft:GoldBug / Email privacy

Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

Add to Reading List

Source URL: bacpuc.org.uk

Language: English - Date: 2016-02-25 06:22:14
18Software / System software / Computer architecture / System administration / Secure Shell / Internet Standards / Unix / Cryptographic software / Filesystem Hierarchy Standard / Chroot / OpenSSH / Passwd

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2000-09-18 13:37:46
19Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
20Cryptography / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Signal Protocol / DiffieHellman key exchange / Digital signature / XTR / HKDF / Signal / Elliptic curve DiffieHellman

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
UPDATE