Cryptographic protocols

Results: 3642



#Item
251

Cryptographic protocols Cryptographic protocols Introduction to cryptographic protocols small programs designed to secure

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 07:25:57
    252

    Automated verification of equivalence properties of cryptographic protocols� Rohit Chadha1 , S¸tefan Ciobˆac˘a1 , and Steve Kremer1,2 1 LSV, ENS Cachan & CNRS & INRIA

    Add to Reading List

    Source URL: www.lsv.ens-cachan.fr

    Language: English - Date: 2012-12-05 06:09:36
      253

      A Computationally Sound Automatic Prover for Cryptographic Protocols Bruno Blanchet ´ cole Normale Sup´ CNRS, E erieure, Paris

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2012-10-01 07:25:52
        254Cryptography / Computing / Software / Cryptographic software / Internet protocols / OpenSSL / Cryptographic protocols / Internet Standards / Secure communication / Transport Layer Security / Apache HTTP Server / Application-Layer Protocol Negotiation

        The State of TLS in httpd 2.4 William A. Rowe Jr. Getting Started ●

        Add to Reading List

        Source URL: events.linuxfoundation.org

        Language: English - Date: 2015-10-02 08:34:41
        255Computing / Cryptography / Secure communication / Software / Cryptographic software / Mbed TLS / Cryptographic protocols / Internet protocols / Transport Layer Security / SHA-1 / Cipher suite / ARM Holdings

        PolarSSLverification kit V1.0 Evaluation version –

        Add to Reading List

        Source URL: trust-in-soft.com

        Language: English - Date: 2015-09-11 09:21:10
        256Computing / Internet / Computer security / Internet security / Transport Layer Security / Software testing / Cryptographic software / Cryptographic protocols / Heartbleed / OpenSSL / Codenomicon / Vulnerability

        Heartbleed_story_2014-09-24

        Add to Reading List

        Source URL: www.codenomicon.com

        Language: English - Date: 2016-03-02 04:58:14
        257

        Automatic verification of privacy properties in the applied pi calculus⋆ St´ephanie Delaune, Mark Ryan, and Ben Smyth Abstract We develop a formal method verification technique for cryptographic protocols. We focus on

        Add to Reading List

        Source URL: www.lsv.ens-cachan.fr

        Language: English - Date: 2008-06-15 08:59:00
          258

          Access Controls for Oblivious and Anonymous Systems SCOTT E. COULL, RedJack MATTHEW GREEN and SUSAN HOHENBERGER, Johns Hopkins University The use of privacy-enhancing cryptographic protocols, such as anonymous credential

          Add to Reading List

          Source URL: www.scottcoull.com

          Language: English - Date: 2014-03-03 12:03:31
            259

            Automatic Verification of Cryptographic Protocols in the Symbolic Model Automatic Verifier ProVerif

            Add to Reading List

            Source URL: prosecco.gforge.inria.fr

            Language: English - Date: 2013-09-02 11:47:42
              260Cryptography / Cryptographic protocols / Public-key cryptography / Search algorithms / Elliptic Curve Digital Signature Algorithm / Elliptic curve cryptography / Hash function / X.509 / SHA-2

              RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

              Add to Reading List

              Source URL: www.ietf.org

              Language: English - Date: 2015-07-23 10:29:05
              UPDATE