Cryptographic software

Results: 2705



#Item
91Cryptography / Computing / Internet / Transport Layer Security / Internet security / Cryptographic protocols / Secure communication / Cryptographic software / Heartbleed / OpenSSL / StartCom / Codenomicon

The Matter of Heartbleed *Zakir Durumeric1 , James Kasten1 , David Adrian1 , J. Alex Halderman1 , Michael Bailey1,2 2

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
92Cryptography / Computer network security / Computer security / Transport Layer Security / Cryptographic software / Vulnerability / FREAK / OpenSSL / Exploit / Attack / Common Vulnerabilities and Exposures / Shellshock

Vulnerabilities At a glance Description A look into software vulnerabilities, whether we are

Add to Reading List

Source URL: www.kennasecurity.com

Language: English - Date: 2016-04-26 13:43:51
93Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Double Ratchet Algorithm / DiffieHellman key exchange / WhatsApp / Digital signature / XTR / Elliptic curve DiffieHellman / Signal

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-05-24 15:16:00
94Software / Computer architecture / System software / Cryptographic software / Archive formats / FreeBSD / OpenBSD / NetBSD / Berkeley Software Distribution / Gzip

Faster and more secure packages in OpenBSD Marc Espie <> October 4, 2015 Marc Espie <>

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2015-10-04 10:06:38
95Cryptographic software / CPAN / Perl / Berkeley Software Distribution / OpenBSD / FreeBSD

Portroach, OpenBSD distfile scanner Jasper Lievisse Adriaanse EuroBSDCon 2015 http://portroach.openbsd.org/ [October 4, 2015]

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2015-10-04 08:04:39
96Cryptography / Cryptographic software / Key management / Strong cryptography / Pretty Good Privacy / Cypherpunk / Encryption / Key / Public-key cryptography / Export of cryptography from the United States / Phil Zimmermann / Data Encryption Standard

Strong Cryptography The Global Tide of Change by Arnold G. Reinhold No. 51

Add to Reading List

Source URL: object.cato.org

Language: English - Date: 2012-12-14 18:44:35
97Cryptography / Computer security / Microsoft Windows / Cryptographic software / Trusted computing / Disk encryption / Windows Vista / Trusted Platform Module / BitLocker / Unified Extensible Firmware Interface / Booting / Trusted Computing Group

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   Trusted  Compu-ng  Technologies   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:12:02
98Cryptographic software / Hardware virtualization / Heartbleed / Internet security / Transport Layer Security / OpenSSL / Hypervisor / Hyper-V / Protection ring / Second Level Address Translation / Rootkit / Operating system

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
99Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-10-16 08:19:35
100System software / Computer architecture / Software / Disk file systems / Disk encryption / Cryptographic software / FreeBSD / GEOM / Dm-crypt / Loop device / Device file / Dd

Images and dm-crypt and LVM2… Oh mount! Speaker Name and info Hal Pomeranz Deer Run Associates

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2011-05-27 21:21:17
UPDATE