OpenSSL

Results: 352



#Item
71Software / Cryptographic software / Computer programming / System software / OpenSSL / Aranha / NTL Incorporated / Recursion / Libgcrypt

RELIC is an Efficient LIbrary for Cryptography Diego F. Aranha Department of Computer Science University of Bras´ılia Relic

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:05
72

` Technical Bulletin April 11, 2014 Addressing the OpenSSL “Heartbleed” vulnerability in

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2014-04-11 13:28:16
    73Computing / Cryptography / Internet / Cryptographic protocols / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / OpenSSL / Comparison of TLS implementations / Cipher suite / WolfSSL

    1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

    Add to Reading List

    Source URL: smacktls.com

    Language: English - Date: 2015-03-05 00:10:02
    74Cryptographic software / OpenSSL / Patent / Software / License / United States patent law / Computing

    Patent Licen se for OpenSSL 1. Definition s 1.1 " Licensor" means Phillip Rogaway. orOne Shields Avenue, Davis, CA " Licensed Patents" means any patent that claims priority to United States Patent Applica

    Add to Reading List

    Source URL: openssl.org

    Language: English - Date: 2015-08-15 21:28:41
    75Software engineering / Programming language theory / Theoretical computer science / C++ / Logic in computer science / Proof assistants / Data types / SHA-2 / Formal verification / Separation logic / Coq / Functional programming

    Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2014-12-23 10:16:22
    76Tor / Cryptographic software / Internet security / Dark web / The Tor Project /  Inc / Orbot / OpenSSL / Facebook

    From: Andrew Lewman, Executive Director To: The Tor Community Date: February 12, 2012 This report documents progress in January 2012.

    Add to Reading List

    Source URL: archive.torproject.org

    Language: English - Date: 2012-02-12 07:28:04
    77Cryptography / Public-key cryptography / Public key infrastructure / Transport Layer Security / Key management / Cryptographic protocols / Public key certificate / X.509 / HTTPS / OpenSSL / Revocation list

    Secure Abstraction with Code Capabilities Robbert van Renesse∗ , H˚avard D. Johansen† , Nihar Naigaonkar∗ , and Dag Johansen† ∗ Cornell University, USA † University of Tromsø, Norway Abstract—We propose

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2012-11-08 10:00:02
    78Public-key cryptography / Cryptographic software / Secure communication / E-commerce / Transport Layer Security / OpenSSL / RSA / Blinding / Mbed TLS / Cipher suite / Forward secrecy / Digital signature

    Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

    Add to Reading List

    Source URL: people.redhat.com

    Language: English - Date: 2015-09-02 09:27:18
    79Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    80Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2014-02-27 10:40:02
    UPDATE