Comparison of TLS implementations

Results: 12



#Item
1Computing / Internet protocols / Cryptography / Network architecture / Cryptographic protocols / Secure communication / Computer networking / QUIC / Network protocols / Datagram Transport Layer Security / Comparison of TLS implementations / Public-key cryptography

2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:10
2Computing / Cryptography / Internet / Cryptographic protocols / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / OpenSSL / Comparison of TLS implementations / Cipher suite / WolfSSL

1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

Add to Reading List

Source URL: smacktls.com

Language: English - Date: 2015-03-05 00:10:02
3Cryptography / Cryptographic software / Secure communication / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Cipher suite / OpenSSL / HTTPS / Comparison of TLS implementations / Client certificate / WolfSSL

Prying open Pandora’s box: KCI attacks against TLS Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes RISE – Research Industrial Systems Engineering GmbH {clemens.hlauschek, markus.gruber, flori

Add to Reading List

Source URL: www.usenix.org

Language: English
4Transport Layer Security / Cryptographic protocols / Cryptographic software / Secure communication / Internet security / OpenSSL / Heartbleed / Comparison of TLS implementations / Mbed TLS / Cipher suite / HTTPS / POODLE

Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation David Kaloper-Merˇsinjak† , Hannes Mehnert† , Anil Madhavapeddy and Peter Sewell University of Cambridge Comput

Add to Reading List

Source URL: anil.recoil.org

Language: English - Date: 2015-07-05 12:54:07
5Cryptographic protocols / Computing / GnuTLS / Internet protocols / Secure communication / Internet standards / Comparison of TLS Implementations / TLS-SRP / Cryptographic software / System software / Cryptography

Introduction to GnuTLS Simon Josefsson http://josefsson.org/ http://www.gnutls.org/

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2012-09-11 01:52:01
6Secure communication / System software / Software / Internet protocols / OpenSSL / Transport Layer Security / OpenVPN / HTTP Secure / Comparison of TLS Implementations / Cryptographic software / Computing / Cryptographic protocols

EARLY CCS ATTACK ANALYSIS June 6, BACKGROUND

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-06-06 18:35:24
7Computing / GnuTLS / GNU Guile / Scheme / Guile / Comparison of TLS Implementations / Cryptographic software / Military personnel / Software

GnuTLS-Guile Guile binding for GNU TLS for version[removed], 23 March 2015 This manual is last updated 23 March 2015 for version[removed]of GnuTLS. c[removed], 2014 Free Software Foundation, Inc.

Add to Reading List

Source URL: www.gnutls.org

Language: English - Date: 2015-03-30 01:33:21
8OpenSSL / System software / Secure Remote Password protocol / GNU General Public License / Free software / Copyright / Comparison of TLS Implementations / Crypto++ / Cryptographic software / Cryptography / Software

crypto Copyright © [removed]Ericsson AB. All Rights Reserved. crypto[removed]December 9, 2014 Copyright © [removed]Ericsson AB. All Rights Reserved.

Add to Reading List

Source URL: erlang.org

Language: English - Date: 2014-12-11 06:30:14
9OpenSSL / System software / Secure Remote Password protocol / GNU General Public License / Free software / Copyright / Comparison of TLS Implementations / Crypto++ / Cryptographic software / Cryptography / Software

crypto Copyright © [removed]Ericsson AB. All Rights Reserved. crypto 3.0 June 17, 2013 Copyright © [removed]Ericsson AB. All Rights Reserved.

Add to Reading List

Source URL: www.erlang.org

Language: English
10Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Computing / FIPS 140 / FIPS 140-3 / Comparison of TLS Implementations / Cryptography standards / Cryptographic software / Computer security

User Guide for the OpenSSL FIPS Object Module v2.0 (including v2.0.1, v2.0.2, v2.0.3, v2.0.4, v2.0.5, v2.0.6, v2.0.7) OpenSSL Software Foundation

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-09-02 16:43:10
UPDATE