Cipher suite

Results: 202



#Item
51Secure communication / Key management / Transport Layer Security / Public-key cryptography / Perfect forward secrecy / Cipher suite / Secure Shell / Key / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Internet protocols

PDF Document

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-09-04 15:37:42
52Cryptographic protocols / Secure communication / Internet protocols / Internet standards / Network performance / Transport Layer Security / Stunnel / HTTP Secure / Cipher suite / Computing / Internet / Network architecture

SSL splitting: securely serving data from untrusted caches Chris Lesniewski-Laas and M. Frans Kaashoek {ctl,kaashoek}@mit.edu Laboratory for Computer Science Massachusetts Institute of Technology Abstract

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
53Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Public-key cryptography / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Abstract

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
54Internet / Secure communication / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Secure Shell / Cipher suite / HTTP Secure / Cryptographic protocols / Computing / Network architecture

Opportunistic Encryption Everywhere Adam Langley Google Inc San Francisco, California

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
55Secure communication / Data / Information / Transport Layer Security / Cipher suite / HTTP Secure / STARTTLS / Server Name Indication / Extensible Messaging and Presence Protocol / Cryptographic protocols / Internet protocols / Computing

draft-ietf-uta-tls-bcp-11 - Recommendations for Secure Use of TLS and DTLS

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-02-23 04:04:03
56Secure communication / Data / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / Cipher suite / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Computing

The Design and Implementation of Protocol-Based Hidden Key Recovery Eu-Jin Goh1 , Dan Boneh1 , Benny Pinkas2 , and Philippe Golle1 1 Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-07-21 17:54:06
57Secure communication / Internet protocols / Cryptographic protocols / System software / Internet standards / Transport Layer Security / Cipher suite / OpenSSL / SHA-2 / Software / Cryptographic software / Computing

SSLデフォルト設定の調査 - サーバ編 - 付録1 Cipher Suite

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-08-05 01:02:35
58Cryptographic software / Computer network security / Password / Windows / Two-factor authentication / Internet security / Cipher suite / Salt / PBKDF2 / Security / Computer security / Cryptography

September 2014
 Version v1.8" ! Thank you for your interest in PasswordBox. On the following pages, you’ll find a

Add to Reading List

Source URL: www.passwordbox.com

Language: English - Date: 2014-09-10 15:03:40
59Stream ciphers / Ciphertext / Cryptanalysis / Block cipher / Key schedule / RSA / Madryga / SXAL/MBAL / Cryptography / Advanced Encryption Standard / Rijndael key schedule

Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
60Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE