Cipher suite

Results: 202



#Item
191Classical cipher / International Obfuscated C Code Contest / Computer programming / Computing / Software engineering

NATIONAL C O M M I T T E E q p u d MENTAL ILLNESS SUITE 1215 * 1028 CONNECTICUT AVENUE, N. W.

Add to Reading List

Source URL: profiles.nlm.nih.gov

Language: English - Date: 2007-01-25 11:09:57
192Internet protocols / Secure communication / Electronic commerce / Transport Layer Security / Cipher suite / Advanced Encryption Standard / Transmission Control Protocol / Elliptic curve cryptography / CryptGenRandom / Cryptography / Pseudorandom number generators / Cryptographic protocols

On the Practical Exploitability of Dual EC in TLS Implementations Stephen Checkoway1, Matthew Fredrikson2, Ruben Niederhagen3, Matthew Green1, Tanja Lange3, Thomas Ristenpart2, Daniel J. Bernstein3, 4 Jake Maskiewicz5, a

Add to Reading List

Source URL: dualec.org

Language: English - Date: 2014-04-07 12:09:11
193Computing / Internet protocols / Security / Internet standards / Electronic commerce / Transport Layer Security / HTTP Secure / Cipher suite / Virtual hosting / Secure communication / Cryptographic protocols / Internet

Secure Socket Layer Copyright © [removed]Ericsson AB. All Rights Reserved. Secure Socket Layer[removed]April 7, 2014 Copyright © [removed]Ericsson AB. All Rights Reserved.

Add to Reading List

Source URL: www.erlang.org

Language: English
194Internet protocols / Cryptographic protocols / Computing / Internet / Internet standards / Transport Layer Security / GnuTLS / Cipher suite / HTTP Secure / Cryptographic software / Secure communication / Cryptography

Published date: [removed]Last Update: [removed]Author: Adrian F. Dimcev, [removed]

Add to Reading List

Source URL: www.carbonwind.net

Language: English - Date: 2011-03-10 08:24:21
195Cryptography / Network architecture / Datagram Transport Layer Security / Transport Layer Security / Datagram Congestion Control Protocol / IPsec / Transmission Control Protocol / Cipher suite / Certificate server / Internet protocols / Computing / Cryptographic protocols

The Design and Implementation of Datagram TLS Nagendra Modadugu Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-11-21 17:02:15
196Secure communication / Cryptographic protocols / Elliptic curve cryptography / Cipher suite / Bitcoin / Elliptic Curve DSA / Secure Shell / Public-key cryptography / Elliptic curve Diffie–Hellman / Cryptography / Key management / Internet protocols

Elliptic Curve Cryptography in Practice Joppe W. Bos1 , J. Alex Halderman2 , Nadia Heninger3 , Jonathan Moore, Michael Naehrig1 , and Eric Wustrow2

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-11-14 17:18:03
197Computing / Internet protocols / Public-key cryptography / Internet standards / Transport Layer Security / Cipher suite / Wireless security / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Secure communication

Security Issues in Mobile Computing Srikanth Pullela Department of Computer Science

Add to Reading List

Source URL: crystal.uta.edu

Language: English - Date: 2002-11-04 12:10:11
198Computing / Data / Information / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / Key Management Interoperability Protocol / OASIS / Cryptographic protocols / Internet protocols / Secure communication

Key Management Interoperability Protocol Profiles Version 1.0 Committee Specification 01

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-06-16 14:10:52
199Pseudorandom number generators / Secure communication / Internet protocols / RC4 / Transport Layer Security / Keystream / Cipher suite / Block cipher modes of operation / E0 / Cryptography / Stream ciphers / Cryptographic protocols

A preliminary version of this paper appears in the proceedings of the USENIX Security Symposium[removed]This is the full version.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-08-05 12:29:08
200Electronic commerce / Internet protocols / Transport Layer Security / Chosen-ciphertext attack / Padding / RSA / Cipher suite / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Secure communication

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-31 07:23:16
UPDATE