<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic software / Cryptographic protocols / Transport Layer Security / Secure communication / Cryptographic primitive / Cryptographic engineering / OpenSSL / Cryptographic hash function / Padding oracle attack / Man-in-the-middle attack / Cryptographically secure pseudorandom number generator
Cryptography
Cryptographic software
Cryptographic protocols
Transport Layer Security
Secure communication
Cryptographic primitive
Cryptographic engineering
OpenSSL
Cryptographic hash function
Padding oracle attack
Man-in-the-middle attack
Cryptographically secure pseudorandom number generator

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: people.csail.mit.edu

Download Document from Source Website

File Size: 121,72 KB

Share Document on Facebook

Similar Documents

Published in Journal of Cryptographic Engineering, 6(3):187–199, Inversion-Free Arithmetic on Elliptic Curves Through Isomorphisms Raveen R. Goundar · Marc Joye

Published in Journal of Cryptographic Engineering, 6(3):187–199, Inversion-Free Arithmetic on Elliptic Curves Through Isomorphisms Raveen R. Goundar · Marc Joye

DocID: 1uMiM - View Document

Published in Journal of Cryptographic Engineering 1(2):161–176, Scalar Multiplication on Weierstraß Elliptic Curves from Co-Z Arithmetic Raveen R. Goundar · Marc Joye · Atsuko Miyaji · Matthieu Rivain · Ale

Published in Journal of Cryptographic Engineering 1(2):161–176, Scalar Multiplication on Weierstraß Elliptic Curves from Co-Z Arithmetic Raveen R. Goundar · Marc Joye · Atsuko Miyaji · Matthieu Rivain · Ale

DocID: 1u88m - View Document

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

2015 IEEE Symposium on Security and Privacy  TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

2015 IEEE Symposium on Security and Privacy TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

DocID: 1rrYP - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

DocID: 1rp54 - View Document