![Cryptography / Cryptographic software / Cryptographic protocols / Transport Layer Security / Secure communication / Cryptographic primitive / Cryptographic engineering / OpenSSL / Cryptographic hash function / Padding oracle attack / Man-in-the-middle attack / Cryptographically secure pseudorandom number generator Cryptography / Cryptographic software / Cryptographic protocols / Transport Layer Security / Secure communication / Cryptographic primitive / Cryptographic engineering / OpenSSL / Cryptographic hash function / Padding oracle attack / Man-in-the-middle attack / Cryptographically secure pseudorandom number generator](https://www.pdfsearch.io/img/fab23db38d71e02656c4fae39eb7a821.jpg) Cryptography Cryptographic software Cryptographic protocols Transport Layer Security Secure communication Cryptographic primitive Cryptographic engineering OpenSSL Cryptographic hash function Padding oracle attack Man-in-the-middle attack Cryptographically secure pseudorandom number generator | | Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)Add to Reading ListSource URL: people.csail.mit.eduDownload Document from Source Website File Size: 121,72 KBShare Document on Facebook
|