Back to Results
First PageMeta Content
Cryptographic protocols / Strong cryptography / Key / Password / Cryptographic hash function / Digital signature / Cryptanalysis / Cryptosystem / Key generation / Cryptography / Key management / Public-key cryptography


Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 108,39 KB

Share Result on Facebook

City

Springer-Verlag / Boulder / Lincoln / /

Company

Prima Publishing / Bruce Schneier Counterpane Systems / Counterpane Systems / Microsoft / Twofish / Xcert Soft / John Wiley & Sons / Group Tele / /

Country

Singapore / /

Currency

USD / /

/

Facility

University of British Columbia / S Building / University of Nebraska / Hall et al. / /

IndustryTerm

communications cellular encryption algorithms / public-transportation access / digital-signature algorithms / real-time certificate status information / cryptography products / secure systems / digital signature algorithms / public key infrastructure / large software / escrow systems / home security systems / weak cryptographic system using strong algorithms / metal key / online credit card verification system / cryptographic algorithm / horse software / Web J. / software systems / actual products / networked directory services / telephone privacy products / metal pins / electronic commerce servers / cryptographic processors / cryptographic systems / secure protocol / commerce systems / cryptographic algorithms / on published algorithms / tamper-resistant hardware / encryption algorithms / stand-alone hardware / weak cryptographic algorithm / Electronic commerce systems / e - commerce / online cer tificate status protocol / elaborate security systems / symmetric algorithms / certificate technology / insecure systems / electronic commerce / good security product / /

MusicGroup

Blaze / /

Organization

Usenix Assoc. / Department of Management / University of Nebraska / Lincoln / University of British Columbia / /

Person

Andrew Csinger / Keng Siau / Carl von Clausewitz / /

Position

president / vice president of electronic commerce at Group / system designer / General / founder / engineer / author / assistant professor / judge / vice president of electronic commerce / /

Product

Blowfish / /

ProvinceOrState

Nebraska / British Columbia / New York / Mississippi / California / Colorado / /

Technology

S/MIME / radiation / RC4 algorithm / Public Key Infrastructure / certificate technology / encryption algorithms / CDMA / PKI / Key exchange protocols / smart card / private key / communications cellular encryption algorithms / cryptographic algorithm / encryption / cryptography / digital certificate / online cer tificate status protocol / Public key / weak cryptographic algorithm / weak algorithm / digital signature algorithms / GSM / GSM encryption / virtual memory / Digital Signature / secure protocol / digital-signature algorithms / network protocols / /

URL

ftp /

SocialTag