Cryptographic protocols

Results: 3642



#Item
931Cryptographic protocols / X.509 / Certificate authority / PKCS / Public key certificate / HTTP Secure / Dan Kaminsky / Root certificate / Basic Encoding Rules / Cryptography / Public-key cryptography / Key management

PKI Layer Cake: New Collision Attacks Against the Global X.509 Infrastructure Dan Kaminsky1 , Meredith L. Patterson, and Len Sassaman2 1 2

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
932Certificate authorities / Electronic commerce / Cryptographic protocols / Comodo Group / Extended Validation Certificate / Verisign / Online shopping / X.509 / Cryptography / Key management / Public-key cryptography

The USP Maker for the hosting industry Welcome to my presentation Christian Heutger WorldHostingDay

Add to Reading List

Source URL: www.psw-group.de

Language: English - Date: 2014-12-31 04:23:09
933Cryptographic protocols / HTTP / Electronic commerce / Public key certificate / HTTP Secure / Self-signed certificate / Certificate authority / Root certificate / Cryptography / Public-key cryptography / Key management

Deprecating Non-Secure HTTP Frequently Asked Questions   Since we announced our plan to ​ focus on HTTPS going forward​ , there have been some 

Add to Reading List

Source URL: blog.mozilla.org

Language: English - Date: 2015-05-01 22:35:50
934Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
935Internet protocols / Secure communication / PKCS / Cryptographic hash function / Cipher suite / Crypto++ / MD4 / SHA-2 / Transport Layer Security / Cryptography / Cryptographic software / Cryptography standards

  CycloneCrypto is a cryptographic toolkit designed for use in embedded systems. It provides a comprehensive set of

Add to Reading List

Source URL: www.oryx-embedded.com

Language: English - Date: 2015-01-25 07:33:55
936Interactive proof system / Non-interactive zero-knowledge proof / Proof of knowledge / IP / Soundness / Zero-knowledge proof / NP / Random oracle / Oracle machine / Cryptography / Theoretical computer science / Cryptographic protocols

On The (In)security Of Fischlin’s Paradigm P RABHANJAN A NANTH Microsoft Research India V IPUL G OYAL Microsoft Research India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 10:18:26
937Cryptographic protocols / Complexity classes / Zero-knowledge proof / Interactive proof system / Commitment scheme / NP / IP / Soundness / Entropy / Theoretical computer science / Cryptography / Applied mathematics

Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model∗ Andr´e Chailloux† Dragos Florin Ciocan‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-13 07:18:22
938Secure multi-party computation / Homomorphic encryption / Paillier cryptosystem / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience? Martin Hirt1 , Jesper Buus Nielsen2 , and Bartosz Przydatek1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-03 06:46:06
939Computer network security / Cryptographic software / Antivirus software / Tunneling protocols / OpenVPN / GNU Privacy Guard / Security-Enhanced Linux / Virtual private network / Wireless security / System software / Software / Computing

A Security Sampler Kevin Fenzi, tummy.com, ltdtummy.com, ltd

Add to Reading List

Source URL: www.tummy.com

Language: English - Date: 2013-10-14 18:28:17
940Information / Password-authenticated key agreement / Cipher suite / Transport Layer Security / Password / Diffie–Hellman problem / Diffie–Hellman key exchange / Public-key cryptography / Encrypted key exchange / Cryptographic protocols / Cryptography / Data

c ACM, 2006. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 2006 ACM Symposi

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-05-22 09:04:49
UPDATE