Cryptographic protocol

Results: 1374



#Item
121Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2014-02-27 10:40:02
122Computer security / Computer access control / Security / Federated identity / Access control / Authentication / Notary / Packaging / Biometrics / Cryptographic protocol / Identity management / Password

Abstract Identity Management through Privacy-Preserving Authentication Ewa Syta Yale University

Add to Reading List

Source URL: ewa.syta.us

Language: English - Date: 2016-04-16 15:06:35
123Turing Award laureates / Public-key cryptography / Cryptography / Applied mathematics / Whitfield Diffie / Ralph Merkle / Martin Hellman / DiffieHellman key exchange / Turing Award / Cryptographic protocol / Ron Rivest / Key management

Contact: Jim OrmondCRYPTOGRAPHY PIONEERS RECEIVE ACM A.M. TURING AWARD

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2016-03-08 10:06:12
124Transport Layer Security / Computing / Internet / Cryptography / Internet security / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / HTTPS / GnuTLS / Heartbleed / Cross-site request forgery

The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP Antoine Delignat-Lavaud, Inria Paris Joint work with K. Bhargavan, C. Fournet, A. Pironti, P.-Y. Strub INTRODUCTION

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 08:53:57
125Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

Add to Reading List

Source URL: www-verimag.imag.fr

Language: English - Date: 2007-10-18 09:44:59
126Cryptography / Public key infrastructure / Transport Layer Security / Key management / Public-key cryptography / Cryptographic protocols / Online Certificate Status Protocol / Certificate authority / Root certificate / IdenTrust / Public key certificate / Trust anchor

Authenticating Identities to Empower Global eCommerce IdenTrust Partner WebSummit March 19, 2008

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:45
127Cryptocurrencies / E-commerce / Economy / Money / Proof-of-stake / Peercoin / Bitcoin network / Bitcoin / Blockchain / Cryptographic hash function / Consensus / BlackCoin

BlackCoin’s Proof-of-Stake Protocol v2 Pavel Vasin www.blackcoin.co Abstract—The current Proof of Stake protocol has several potential security issues: coin age can be abused by malicious nodes to gain significant ne

Add to Reading List

Source URL: blackcoin.co

Language: English - Date: 2016-02-17 22:48:53
128Transport Layer Security / Cryptographic protocols / Secure communication / Internet Standards / Internet protocols / HTTPS / FREAK

Attacking and Proving TLS 1.3 implementations Karthikeyan Bhargavan December 2, 2015 The Transport Layer Security (TLS) protocol is widely used to provide secure channels for the Web (https), email, and Wi-Fi networks. I

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2015-12-02 09:59:52
129Computing / Internet / Internet privacy / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Network performance / Proxy server / HTTP cookie / Transport Layer Security / Email

REEF FAMILY OF COMPANIES WEBSITE PRIVACY POLICY Visitors to the Reef Family of Companies website are not required to provide any personal information. However, to use certain features on this site, you may be asked to pr

Add to Reading List

Source URL: reefogc.com

Language: English - Date: 2010-08-20 15:18:56
130

Verifying Protocol Implementations by Augmenting Existing Cryptographic Libraries with Specifications Gijs Vanspauwen and Bart Jacobs iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {gijs.vanspauwen,bart.jacobs}@cs.kul

Add to Reading List

Source URL: www.stance-project.eu

Language: English - Date: 2015-09-15 07:28:15
    UPDATE