Cryptographic software

Results: 2705



#Item
111Cryptography / Cryptographic software / Key management / Internet security / Transport Layer Security / OpenSSL / Heartbleed / Key / GNU Privacy Guard / Public-key cryptography / SHA-1 / Password

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-09-17 23:54:20
112Secure communication / Public-key cryptography / Elliptic curve cryptography / Cryptographic protocols / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / HTTPS / Elliptic curve DiffieHellman / Handshaking / RSA

A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

Add to Reading List

Source URL: securewww.esat.kuleuven.be

Language: English
113Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol

A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
114Disk encryption / Cryptographic software / Cross-platform software / Discontinued software / TrueCrypt

IN THE CITY OF WESTMINSTER MAGISTRATES’ COURT NoDISTRICT JUDGE TEMPIA IN THE MATTER OF AN APPLICATION UNDER SECTION 1 OF THE POLICE PROPERTY ACT 1897 LAURI LOVE

Add to Reading List

Source URL: freelauri.com

Language: English - Date: 2016-04-01 12:29:49
115Software / Cryptographic software / Computing / Secure Shell / System software / Key management / Comparison of SSH servers / Ssh-agent / Ssh-keygen

ITL BULLETIN FOR JANUARY 2016 SECURING INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT USING SECURE SHELL (SSH) Murugiah Souppaya, Karen Scarfone, 1 and Larry Feldman, 2 Editors Computer Security Division Information Technol

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-01-11 10:13:44
116

IBM Software Data Sheet Arxan Cryptographic Key Protection Add-On for

Add to Reading List

Source URL: fr.arxan.com

Language: English - Date: 2015-05-23 15:57:34
    117Computer architecture / Software / System software / Berkeley Software Distribution / Cryptographic software / Ports collection / NetBSD / Arch Linux / OpenBSD / Debian

    Building -stable Packages on OpenBSD A Primer (for the stubborn) SEMIBUG

    Add to Reading List

    Source URL: www.semibug.org

    Language: English - Date: 2015-12-16 08:16:47
    118Software / Free software / Computer architecture / Bacula / Cryptographic software / OpenBSD / Puppet / Berkeley Software Distribution / NetBSD / Operating system / POSIX

    Where Bacula meets OpenBSD and friends -25% Agenda

    Add to Reading List

    Source URL: www.mtier.org

    Language: English - Date: 2013-09-30 14:16:09
    119Cryptography / Instant messaging clients / Cryptographic software / Communication software / Cross-platform software / WhatsApp / Signal / End-to-end encryption / Public-key cryptography / Key / Man-in-the-middle attack / Transport Layer Security

    WhatsApp Encryption Overview Technical white paper April 4, 2016

    Add to Reading List

    Source URL: www.whatsapp.com

    Language: English
    120Security / Computer security / Cyberwarfare / Formal methods / Logic in computer science / E-commerce / Secure communication / Cryptographic software / Formal verification / Cryptographic protocol / Vulnerability / ProVerif

    More Secure Software Systems by Formal Verification, Property-Based Testing, Secure Compilation, and Dynamic Monitoring Cătălin Hrițcu Inria Paris, Prosecco team

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2015-12-15 12:26:17
    UPDATE