Back to Results
First PageMeta Content
Cipher / SHA-1 / Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Cryptography / Mathematical sciences / Science


Draft revision: 3f5ad4f[removed]:38:47 +0200) Pepi Zawodsky Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, U
Add to Reading List

Document Date: 2014-06-21 11:07:34


Open Document

File Size: 1,35 MB

Share Result on Facebook

City

Nuremberg / Reading / /

Company

Check Point / Instant Messaging Systems / Oracle / Database Systems / MySQL / Cisco ASA / the Guardian / /

Facility

Campus Wien / University of Vienna / /

IndustryTerm

crypto systems / cryptographic tools / similar consumer devices / proxy solutions / industrial control systems / public Internet / crypto tools / Internet-facing services / Wireless Access Points / public git server / encryption systems / /

OperatingSystem

Linux / Cisco IOS / L3 / /

Organization

United Nations / University of Vienna / Certificate Authority / /

Person

Patrick Riebesel / Ulrich Pöschl / Ross Anderson / Cyril Dirksen-Thedens / Thomas Schreck / Christian Mock / Berg San / Alexandre Gühring Philipp Grigg / Daniel Lenzhofer / Anna (Logo) Pichler / Ramin Sabet / Martin Seidl / Hugh Pacher / Manuel Koschuch / William James / L. Aaron Kaplan / Stefan Lorünser / Nicolas Roeckx / Thomas Millauer / Christoph Palfrader / Tobias (layout) Petukhova / Tobias Dussa / Tobias Mirbach / Kurt Rublik / Edward Snowden / Florian Mendel / Axel Kovacic / Ralf Schlatterbeck / Aaron Zauner / Scott Brulebois / Bruce Schneier / Ian Horenbeck / Peter Pape / David Durvaux / Alexander Würstlein / /

Position

specific author / administrator / /

Product

FireWall-1 / /

PublishedMedium

the Guardian / /

Technology

virtual machine / Linux / PKI / html / SSL / public-key infrastructure / mobile devices / encryption / cryptography / Public Key / Wireless Access / FireWall / HTTP / /

URL

GitHub.com / http /

SocialTag