Cryptographic protocols

Results: 3642



#Item
211

Using Task-Structured PIOAs to Analyze Cryptographic Protocols Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira and Roberto Segala March 5, 2006

Add to Reading List

Source URL: research.ihost.com

Language: English - Date: 2006-03-28 15:48:54
    212Cryptography / Public-key cryptography / Public key infrastructure / Transport Layer Security / Key management / Cryptographic protocols / Public key certificate / X.509 / HTTPS / OpenSSL / Revocation list

    Secure Abstraction with Code Capabilities Robbert van Renesse∗ , H˚avard D. Johansen† , Nihar Naigaonkar∗ , and Dag Johansen† ∗ Cornell University, USA † University of Tromsø, Norway Abstract—We propose

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2012-11-08 10:00:02
    213

    Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2010-03-26 06:44:57
      214Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

      Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

      Add to Reading List

      Source URL: aaspring.com

      Language: English - Date: 2015-08-21 16:58:21
      215Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

      A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

      Add to Reading List

      Source URL: tls.mbed.org

      Language: English
      216Secure communication / Security / Cyberwarfare / Computing / Electronic voting in Estonia / Electronic voting / Computer network security / Cryptographic protocols / Denial-of-service attack / Voting system / Server / Absentee ballot

      Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

      Add to Reading List

      Source URL: aaspring.com

      Language: English - Date: 2015-01-16 19:16:47
      217Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

      Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2006-04-27 10:23:08
      218

      GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits Thomas Schneider and Michael Zohner Engineering Cryptographic Protocols Group (ENCRYPTO), European Center for Security and Privacy by Design (EC

      Add to Reading List

      Source URL: fc13.ifca.ai

      Language: English - Date: 2013-03-27 20:42:00
        219

        Automatic verification of privacy properties in the applied pi calculus? St´ephanie Delaune, Mark Ryan, and Ben Smyth Abstract We develop a formal method verification technique for cryptographic protocols. We focus on p

        Add to Reading List

        Source URL: bensmyth.com

        Language: English - Date: 2012-05-24 07:24:42
          220Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

          The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

          Add to Reading List

          Source URL: www.strongswan.org

          Language: English - Date: 2010-06-11 08:24:10
          UPDATE