Cryptographic protocols

Results: 3642



#Item
181

ABSTRACT NONMONOTONIC CRYPTOGRAPHIC PROTOCOLS by Aviel David Rubin Co-Chairs: Adjunct Associate Professor Peter Honeyman & Professor Bernard Galler

Add to Reading List

Source URL: avirubin.com

Language: English - Date: 2012-11-01 14:49:45
    182Computing / Internet / Cyberspace / Email / Internet protocols / Spam filtering / Cryptographic protocols / Opportunistic TLS / Simple Mail Transfer Protocol / DMARC / Transport Layer Security / DomainKeys Identified Mail

    Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

    Add to Reading List

    Source URL: mdbailey.ece.illinois.edu

    Language: English - Date: 2015-11-02 23:42:17
    183Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

    Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2016-01-06 07:34:05
    184Cryptography / Computing / Secure communication / Cryptographic protocols / Internet protocols / E-commerce / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / RSA / HTTPS

    On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2015-08-21 05:45:15
    185Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    186Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

    Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2016-01-06 06:14:04
    187Automated theorem proving / BurrowsAbadiNeedham logic / -calculus / Modal logic / RSA

    Analysis of Cryptographic Protocols using Logics of Belief: an Overview David Monniaux ´ Ecole Normale Sup´erieure

    Add to Reading List

    Source URL: www-verimag.imag.fr

    Language: English - Date: 2007-10-18 09:44:19
    188Transport Layer Security / Computing / Internet / Cryptography / Internet security / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / HTTPS / GnuTLS / Heartbleed / Cross-site request forgery

    The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP Antoine Delignat-Lavaud, Inria Paris Joint work with K. Bhargavan, C. Fournet, A. Pironti, P.-Y. Strub INTRODUCTION

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2016-01-06 08:53:57
    189

    TURUANI Mathieu PhD Student in the CASSIS team, LORIA-INRIA research center. ”Automatic Verification of Cryptographic Protocols” Tel (lab) : (+ Fax (lab) : (+

    Add to Reading List

    Source URL: www.loria.fr

    Language: English - Date: 2003-10-03 08:21:08
      190Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

      Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

      Add to Reading List

      Source URL: www-verimag.imag.fr

      Language: English - Date: 2007-10-18 09:44:59
      UPDATE