Cryptographic software

Results: 2705



#Item
161

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-09 19:41:15
    162Cryptography / Computing / Software / Cryptographic software / Internet protocols / OpenSSL / Cryptographic protocols / Internet Standards / Secure communication / Transport Layer Security / Apache HTTP Server / Application-Layer Protocol Negotiation

    The State of TLS in httpd 2.4 William A. Rowe Jr. Getting Started ●

    Add to Reading List

    Source URL: events.linuxfoundation.org

    Language: English - Date: 2015-10-02 08:34:41
    163Computing / Cryptography / Secure communication / Software / Cryptographic software / Mbed TLS / Cryptographic protocols / Internet protocols / Transport Layer Security / SHA-1 / Cipher suite / ARM Holdings

    PolarSSLverification kit V1.0 Evaluation version –

    Add to Reading List

    Source URL: trust-in-soft.com

    Language: English - Date: 2015-09-11 09:21:10
    164Computing / Internet / Software / Internet security / Tor / Cryptographic software / The Tor Project /  Inc / Software bug / OpenSSL

    From: Andrew Lewman, Executive Director To: The Tor Community Date: January 14, 2012 This report documents progress in December 2011.

    Add to Reading List

    Source URL: archive.torproject.org

    Language: English - Date: 2012-01-14 15:24:13
    165

    R ESOURCE - EFFICIENT C RYPTOGRAPHY FOR U BIQUITOUS C OMPUTING Lightweight Cryptographic Primitives from a Hardware & Software Perspective D ISSERTATION

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2015-03-16 07:30:33
      166Computing / Internet / Computer security / Internet security / Transport Layer Security / Software testing / Cryptographic software / Cryptographic protocols / Heartbleed / OpenSSL / Codenomicon / Vulnerability

      Heartbleed_story_2014-09-24

      Add to Reading List

      Source URL: www.codenomicon.com

      Language: English - Date: 2016-03-02 04:58:14
      167Software / Computing / Cryptographic software / Lua / OpenSSL / X.509 / NetBSD / LibreSSL / SSLeay

      User Guide to luaossl, Comprehensive OpenSSL Module for Lua William Ahern June 4, 2015 Contents

      Add to Reading List

      Source URL: www.25thandclement.com

      Language: English - Date: 2015-06-04 21:34:22
      168Software / System software / Computing / Cryptographic software / Secure Shell / Ssh-agent / Ssh-keygen / OpenSSH / PuTTY / Comparison of SSH clients / Telnet / Rlogin

      Advanced OpenSSH ! PLUG Jan 2, 2014 Carlos Aguayo

      Add to Reading List

      Source URL: pdxlinux.org

      Language: English - Date: 2014-05-29 15:33:57
      169Secure communication / Internet Standards / Cryptographic protocols / Cryptographic software / Transport Layer Security / Handshaking / FTPS / SSL acceleration

      DIMACS Security & Cryptography Crash Course – day 4 Internet Cryptography Tools, Part I: TLS/SSL Prof. Amir Herzberg

      Add to Reading List

      Source URL: dimacs.rutgers.edu

      Language: English - Date: 2003-07-30 14:06:03
      170Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network

      On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

      Add to Reading List

      Source URL: www-users.cs.umn.edu

      Language: English - Date: 2006-10-10 13:39:42
      UPDATE