First Page | Document Content | |
---|---|---|
Cryptography Cryptographic software Cryptographic protocols Transport Layer Security Secure communication Cryptographic primitive Cryptographic engineering OpenSSL Cryptographic hash function Padding oracle attack Man-in-the-middle attack Cryptographically secure pseudorandom number generator | Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)Add to Reading ListSource URL: people.csail.mit.eduDownload Document from Source WebsiteFile Size: 121,72 KBShare Document on Facebook |
PDF DocumentDocID: 1xvjX - View Document | |
Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security FaDocID: 1vi5X - View Document | |
Attacking OpenSSL using Side-channel Attacks: the RSA case study Praveen Kumar Vadnala, Lukasz Chmielewski Riscure BV, Delft, The Netherlands Abstract. We show that RSA implementation present in OpenSSL can be successfulDocID: 1uZg6 - View Document | |
OpenSSL FIPS Object Module Version 1.2.2DocID: 1uDLV - View Document | |
OpenSSL FIPS Object Module VersionBy the OpenSSL Software FoundationDocID: 1uz9m - View Document |