Cryptographic protocols

Results: 3642



#Item
201Secure communication / Cryptographic software / Internet security / Tor / Internet protocols / The Tor Project /  Inc / Flash proxy / The Guardian Project / Firefox / HTTPS

Monthly Progress report for April 2012 The Tor Project, Inc. Contents 1 Research 1.1 Anonymous Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2012-05-11 15:32:41
202

Introduction to cryptographic protocols Bruno Blanchet CNRS, École Normale Supérieure, INRIA March 2009

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 07:25:58
    203Cryptography / Computer access control / Cryptographic protocols / Password-authenticated key agreement / Password / Passwd / Encrypted key exchange / Crypt / Password Authenticated Key Exchange by Juggling

    Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-19 12:50:59
    204Computing / Cryptography / Internet / Cryptographic protocols / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / OpenSSL / Comparison of TLS implementations / Cipher suite / WolfSSL

    1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

    Add to Reading List

    Source URL: smacktls.com

    Language: English - Date: 2015-03-05 00:10:02
    205

    Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp

    Add to Reading List

    Source URL: www.kb.ecei.tohoku.ac.jp

    Language: English - Date: 2008-12-22 04:20:35
      206

      A Computationally Sound Mechanized Prover for Cryptographic Protocols Bruno Blanchet ´ cole Normale Sup´ CNRS, E erieure, Paris

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2012-10-01 07:25:55
        207

        FORMAL VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS WITH AUTOMATED REASONING

        Add to Reading List

        Source URL: etheses.bham.ac.uk

        Language: English - Date: 2011-07-19 12:38:55
          208IPsec / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / Security association / Openswan

          strongSwan VPNs scalable and modularized! Andreas Steffen Copyright © 2008 by Andreas Steffen

          Add to Reading List

          Source URL: www.strongswan.org

          Language: English - Date: 2008-05-05 12:09:19
          209

          A process algebraic analysis of privacy-type properties in cryptographic protocols

          Add to Reading List

          Source URL: ceres.hh.se

          Language: English - Date: 2014-09-06 21:31:34
            210Cryptography / Theoretical computer science / E-commerce / Secure communication / Model checking / Cryptographic protocol / Public-key cryptography / Communications protocol / Formal methods / Computer security / Secure multi-party computation

            Secure Protocols for Secrecy Hanane Houmani and Mohamed Mejri LSFM Research Group Computer Science Department LAVAL University Quebec, Canada

            Add to Reading List

            Source URL: www.qatar.cmu.edu

            Language: English - Date: 2004-12-05 23:21:27
            UPDATE