Cryptographic protocols

Results: 3642



#Item
191

Automatic Verification of Cryptographic Protocols in the Formal Model Automatic Verifier ProVerif

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2016-02-08 06:18:29
    192Cryptography / Public key infrastructure / Transport Layer Security / Key management / Public-key cryptography / Cryptographic protocols / Online Certificate Status Protocol / Certificate authority / Root certificate / IdenTrust / Public key certificate / Trust anchor

    Authenticating Identities to Empower Global eCommerce IdenTrust Partner WebSummit March 19, 2008

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2012-07-10 20:41:45
    193Secure communication / Cryptographic software / Cryptographic protocols / Internet protocols / Internet Standards / Transport Layer Security / OpenSSL / Cipher suite / GnuTLS / WolfSSL / Handshaking / HTTPS

    F LEX TLS A Tool for Testing TLS Implementations Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, and Karthikeyan Bhargavan INRIA Paris-Rocquencourt Abstract

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-21 19:32:47
    194Transport Layer Security / Cryptographic protocols / Secure communication / Internet Standards / Internet protocols / HTTPS / FREAK

    Attacking and Proving TLS 1.3 implementations Karthikeyan Bhargavan December 2, 2015 The Transport Layer Security (TLS) protocol is widely used to provide secure channels for the Web (https), email, and Wi-Fi networks. I

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2015-12-02 09:59:52
    195

    Activity 17 The Peruvian coin flip—Cryptographic protocols Age group Older elementary and up. Abilities assumed Requires counting, and recognition of odd and even

    Add to Reading List

    Source URL: csunplugged.org

    Language: English - Date: 2014-12-09 16:29:32
      196Computing / Internet / Internet privacy / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Network performance / Proxy server / HTTP cookie / Transport Layer Security / Email

      REEF FAMILY OF COMPANIES WEBSITE PRIVACY POLICY Visitors to the Reef Family of Companies website are not required to provide any personal information. However, to use certain features on this site, you may be asked to pr

      Add to Reading List

      Source URL: reefogc.com

      Language: English - Date: 2010-08-20 15:18:56
      197

      Automatic Verification of Cryptographic Protocols in the Formal Model Automatic Verifier ProVerif

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2012-10-01 07:25:58
        198

        Automatic verification of privacy properties in the applied pi calculus? St´ephanie Delaune, Mark Ryan, and Ben Smyth Abstract We develop a formal method verification technique for cryptographic protocols. We focus on p

        Add to Reading List

        Source URL: www.bensmyth.com

        Language: English - Date: 2012-05-24 07:24:42
          199Cryptography / Cryptographic protocols / Garbled circuit / Secure multi-party computation / Commitment scheme / Parameter

          Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique∗ (Technical report – September 11, 2013) Luís T. A. N. Brandão† University of Lisbon

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2013-09-12 00:27:33
          200Computing / Web development / Internet / HTML / Web design / Communication design / Cryptographic protocols / Humancomputer interaction / Internet Engineering Task Force / Foundation / World Wide Web / HTTPS

            IETF  Design Brief  June 2015 

          Add to Reading List

          Source URL: iaoc.ietf.org

          Language: English - Date: 2015-07-07 01:18:59
          UPDATE