Cryptographic engineering

Results: 331



#Item
31

USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

Add to Reading List

Source URL: www.proxmark.org

Language: English - Date: 2008-05-28 17:05:03
    32Cryptography / Cryptographic software / Secure communication / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Cipher suite / OpenSSL / HTTPS / Comparison of TLS implementations / Client certificate / WolfSSL

    Prying open Pandora’s box: KCI attacks against TLS Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes RISE – Research Industrial Systems Engineering GmbH {clemens.hlauschek, markus.gruber, flori

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    33Transport Layer Security / Cryptographic protocols / Cryptographic software / Secure communication / Internet security / OpenSSL / Heartbleed / Comparison of TLS implementations / Mbed TLS / Cipher suite / HTTPS / POODLE

    Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation David Kaloper-Merˇsinjak† , Hannes Mehnert† , Anil Madhavapeddy and Peter Sewell University of Cambridge Comput

    Add to Reading List

    Source URL: anil.recoil.org

    Language: English - Date: 2015-07-05 12:54:07
    34Steganography / Electronics / Digital audio / Audio engineering / Cryptographic software / Steganalysis / Pulse-code modulation / Data compression / Speech coding / Cryptography / Espionage / Audio codecs

    An improved adaptive gain equalizer for noise reduction with low speech distortion

    Add to Reading List

    Source URL: asmp.eurasipjournals.com

    Language: English
    35

    Prudent Engineering Practice for Cryptographic Protocols Martn Abadi and Roger Needham November 1, 1995 Martn Abadi is at the Systems Research Center, Digital Equipment Corporation, 130 Lytton Avenue, Palo Alto, CA

    Add to Reading List

    Source URL: users.ece.cmu.edu

    - Date: 2004-09-25 11:38:53
      36Computing / Data / Internet / Transport Layer Security / Cipher suite / STARTTLS / HTTP Secure / Server Name Indication / Extensible Messaging and Presence Protocol / Cryptographic protocols / Internet protocols / Secure communication

      Internet Engineering Task Force (IETF) Request for Comments: 7525 BCP: 195 Category: Best Current Practice ISSN:

      Add to Reading List

      Source URL: www.rfc-editor.org

      Language: English - Date: 2015-05-04 21:46:01
      37Electronics / Field-programmable gate array / VEST / ESTREAM / Algorithm / Throughput / Application-specific integrated circuit / Achterbahn / Hardware description language / Stream ciphers / Cryptography / Electronic engineering

      Recommendations for Hardware Evaluation of Cryptographic Algorithms Frank K. Gürkaynak, Peter Luethi Integrated Systems Laboratory, ETH Zurich CH-8092 Switzerland Abstract. At the SASC 2006 three papers on hardware impl

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2006-02-17 04:36:19
      38Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

      Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

      Add to Reading List

      Source URL: www.rfc-editor.org

      Language: English - Date: 2011-10-18 14:31:43
      39Software / Cryptographic software / Tor / Relay / Guard / Prison Break: The Final Break / Anonymity / Internet privacy / Electromagnetism / Electrical engineering

      Better guard rotation parameters Roger Dingledine Tor Tech ReportAugust 20, 2011

      Add to Reading List

      Source URL: research.torproject.org

      Language: English - Date: 2012-08-30 03:15:12
      40Cryptographic hash functions / SHA-2 / ALGOL 68 / Program management / Ada / Construction / Computing / Software engineering / Programming language theory

      CTC Financial Vote List 2.5 Highway Financial Matters March 26, 2015

      Add to Reading List

      Source URL: www.dot.ca.gov

      Language: English - Date: 2015-03-30 14:06:57
      UPDATE