Cipher suite

Results: 202



#Item
161Computing / Internet / Data / Internet standards / Cryptographic software / Transport Layer Security / HTTP Secure / Cipher suite / Cryptography / Secure communication / Cryptographic protocols / Internet protocols

PDF Document

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-11-30 14:59:44
162Computing / Internet / Cryptography / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / HTTP Secure / X.509 / Cryptographic protocols / Secure communication / Internet protocols

NIST Special Publication[removed]Revision 1 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS)

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-04-28 16:23:56
163Key management / Cryptographic software / Advanced Encryption Standard / NSA Suite B Cryptography / HMAC / Key Wrap / Key / FIPS 140-2 / Block cipher modes of operation / Cryptography / Cryptography standards / Message authentication codes

Microsoft Word - 1e - Mocana Suite B 5.5fs Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-27 16:48:28
164Computing / Cryptography / Data / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / X.509 / TLS-SRP / Cryptographic protocols / Secure communication / Internet protocols

Guidelines for the Selection and Use of Transport Layer Security Implementations

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-24 14:33:59
165Internet protocols / Internet / Cryptography / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / OSI model / FTPS / Secure communication / Computing / Cryptographic protocols

Guidelines for the Selection and Use of Transport Layer Security Implementations

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2014-08-02 23:09:52
166Advanced Encryption Standard / Block cipher / Ciphertext / Cipher / Ciphertext stealing / Substitution-permutation network / Cryptography / Block cipher modes of operation / Initialization vector

The Advanced Encryption Standard Algorithm Validation Suite (AESAVS) November 15, 2002 Lawrence E. Bassham III National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
167Cryptography / Computing / Internet / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / RC4 / HTTP Secure / Secure communication / Cryptographic protocols / Internet protocols

On the Security of RC4 in TLS Nadhem AlFardan, Dan Bernstein, Kenny Paterson, Bertram Poettering, Jacob Schuldt Royal Holloway, University of London University of Illinois at Chicago http://www.isg.rhul.ac.uk/tls/

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-08-28 06:11:15
168Secure communication / Electronic commerce / Transport Layer Security / Padding / Block cipher modes of operation / GnuTLS / Cipher suite / RC4 / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Internet protocols

Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-08-09 07:53:35
169Cryptographic protocols / IEEE 802.11 / Technology / Computing / Wireless security / Wireless access point / Aircrack-ng / Lightweight Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless networking / Cryptography / Computer network security

Operations Team Admin Advisory-003 Cipher suite selection for eduroam Service Providers

Add to Reading List

Source URL: www.eduroam.org

Language: English - Date: 2009-02-05 07:56:34
170Secure communication / Internet standards / Key management / Transport Layer Security / Cipher suite / HTTP Strict Transport Security / Qualys / Extended Validation Certificate / Certificate authority / Cryptography / Internet protocols / Cryptographic protocols

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2014-06-09 13:32:28
UPDATE