1![Efficient Padding Oracle Attacks On Cryptographic Hardware or The Million Message Attack inMessages Graham Steel joint work with R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, J. Kai-Tsay Efficient Padding Oracle Attacks On Cryptographic Hardware or The Million Message Attack inMessages Graham Steel joint work with R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, J. Kai-Tsay](https://www.pdfsearch.io/img/9ebf829e0585059ab7d4c3417451a435.jpg) | Add to Reading ListSource URL: www.iacr.org- Date: 2012-08-21 15:40:12
|
---|
2![Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M](https://www.pdfsearch.io/img/69338ce618c66883cb478a8f43ffb907.jpg) | Add to Reading ListSource URL: drownattack.comLanguage: English - Date: 2016-07-01 21:14:30
|
---|
3![SOLUTION BRIEF Your Cloud Servers Are Under Attack. How Can You Tell? Instant visibility & active security, anywhere, at any scale. THE VISIBILITY CHALLENGE SOLUTION BRIEF Your Cloud Servers Are Under Attack. How Can You Tell? Instant visibility & active security, anywhere, at any scale. THE VISIBILITY CHALLENGE](https://www.pdfsearch.io/img/2fcc85beea67f39c0b54aa4fb4b8e290.jpg) | Add to Reading ListSource URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.comLanguage: English - Date: 2016-05-25 17:45:06
|
---|
4![Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2 Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2](https://www.pdfsearch.io/img/0900e8803134a1d1e9bcade44b62994d.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2008-07-20 11:55:06
|
---|
5![Angelo Prado Neal Harris Yoel Gluck SSL, GONE Angelo Prado Neal Harris Yoel Gluck SSL, GONE](https://www.pdfsearch.io/img/fed732d262f777875edc1ae77d53d9ad.jpg) | Add to Reading ListSource URL: breachattack.comLanguage: English - Date: 2013-08-05 21:32:24
|
---|
6![Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009 Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009](https://www.pdfsearch.io/img/de2a40473147e0216fd26edbf5cc6450.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-04-19 19:54:55
|
---|
7![Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009, Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,](https://www.pdfsearch.io/img/f49e0c25516ee6074a2c09aa2cb4b71c.jpg) | Add to Reading ListSource URL: tls.mbed.orgLanguage: English - Date: 2016-01-19 07:39:30
|
---|
8![Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland](https://www.pdfsearch.io/img/de2263f8c7489ca31d6860349d5dfe7d.jpg) | Add to Reading ListSource URL: www.neven.orgLanguage: English - Date: 2012-04-18 06:08:49
|
---|
9![Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1 Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1](https://www.pdfsearch.io/img/edf0cdf836cd28bb9a944e84a1a02672.jpg) | Add to Reading ListSource URL: certicrypt.gforge.inria.frLanguage: English - Date: 2013-06-17 13:32:36
|
---|