Cryptographic software

Results: 2705



#Item
101Cryptography / Software / Computer security / OpenPGP / Cryptographic software / Computer access control / USB / YubiKey / Gpg4win / GNU Privacy Guard / Public-key cryptography / Encryption

GnuPG Installation, Key Generation, & Decryption

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-12-15 16:56:28
102Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

Analysis of a Measured Launch

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 13:59:25
103Cryptographic protocol / DolevYao model / Communications protocol / Decidability / Philosophy / Abstraction / Computing

On Well-founded Security Protocols (Extended Abstract) Sibylle Fr¨oschle OFFIS & University of Oldenburg, Germany Email: Consider the decidability problem that stands behind

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
104Cryptography / Computing / Software / Hypertext Transfer Protocol / Transport Layer Security / Secure communication / Cryptographic protocols / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / HTTPS / Browser security

Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning Michael Kranch Joseph Bonneau

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-07-30 05:47:43
105Cryptography / Key management / Cryptographic software / Bcrypt / Scrypt / Crypt / Key stretching / Password cracking / Key derivation function / Blowfish / Block cipher / Password

battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:34:12
106Cryptography / Cryptography standards / Cryptographic software / Computing / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / SHA-2

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-05-11 21:52:06
107Free software / Cryptography / Software / Cloud storage / OwnCloud / Disk encryption / Cryptographic software / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

ownCloud Security and Encryption 2.0; A Technical Overview ownCloud, Inc. 57 Bedford Street, Suite 102

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-03-16 13:42:38
108Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 06:14:04
109Cryptography / Cryptographic software / Key management / Internet security / Transport Layer Security / GNU Privacy Guard / OpenSSL / Key server / Key / Public-key cryptography / Heartbleed / Common Vulnerabilities and Exposures

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-10-02 16:10:38
110Software / Cryptographic software / Computer security / Computer access control / Google Chrome extensions / Mozilla add-ons / Dashlane / Cryptography / Password / Salt / OpenSSL / Multi-factor authentication

Dashlane Security White Paper v2.8 Dashlane Security Whitepaper March 2016 1. General Security Principles a. Protection of User Data in Dashlane

Add to Reading List

Source URL: www.dashlane.com

Language: English - Date: 2016-03-23 12:49:58
UPDATE