Cipher suite

Results: 202



#Item
1Microsoft PowerPoint - preneel_isse15_v1.pptx

Microsoft PowerPoint - preneel_isse15_v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2015-11-15 11:53:49
2Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track  T. Dierks

Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:49
3Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:45
4Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:58
5Harden SSL/TLS v1.01 Windows hardening tool Thierry ZOLLER http://blog.zoller.lu http://www.g-sec.lu

Harden SSL/TLS v1.01 Windows hardening tool Thierry ZOLLER http://blog.zoller.lu http://www.g-sec.lu

Add to Reading List

Source URL: www.zoller.lu

Language: English - Date: 2013-06-26 14:25:36
6Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
7Thierry ZOLLER Principal Security Consultant  http://www.g-sec.lu  G-SEC™ is a vendor independent Luxemburgish led

Thierry ZOLLER Principal Security Consultant http://www.g-sec.lu G-SEC™ is a vendor independent Luxemburgish led

Add to Reading List

Source URL: www.g-sec.lu

Language: English - Date: 2010-02-16 11:11:06
8Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 06:14:04
9A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren  Vesselin Velichkov

A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

Add to Reading List

Source URL: securewww.esat.kuleuven.be

Language: English
10Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 07:34:05