Cryptographic software

Results: 2705



#Item
31Software / Computer architecture / System software / Cryptographic software / NetBSD / Berkeley Software Distribution / FreeBSD / OpenBSD / Vi / Linux kernel / OpenSSH / LibreSSL

A Case Study of Cross-System Porting in Forked Projects Baishakhi Ray and Miryung Kim The University of Texas at Austin Austin, TX USA ,

Add to Reading List

Source URL: rayb.info

Language: English - Date: 2016-08-19 22:20:15
32Computer access control / Obfuscation / Prevention / Password / Security / Passwd / Identity management / Cryptographic software

March 17, 2016 MEMORANDUM FOR: GOES DCS LRGS Data Users

Add to Reading List

Source URL: dcs4.noaa.gov

Language: English - Date: 2016-03-24 15:28:31
33Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-03-03 02:38:59
34Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
35Cryptography / Free software / Software / Cloud storage / Cryptographic software / OwnCloud / Disk encryption / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

ownCloud Security and Encryption 2.0 A Technical Overview As the use of file sharing increases across the industry, more attention is being paid to the inherent security of these solutions and the need for corporations t

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-12 11:34:59
36Software / System software / Computer architecture / Cryptographic software / Secure Shell / System administration / Ifconfig / Routing / OpenSSH / Ubuntu / Superuser

Cd Step 2: From SD image to RC control    Prerequisites:  ­ A complete Duckiebot in configuration C0.  ­ A joystick.  ­ An SD card with image v1.1. 

Add to Reading List

Source URL: duckietown.mit.edu

Language: English - Date: 2016-08-18 14:45:02
37Cryptography / Disk encryption / Cryptographic software / Serial ATA / Block cipher mode of operation / Key / Encryption / BestCrypt / Hardware-based full disk encryption

X-Wall MX Introduction

Add to Reading List

Source URL: www.enovatech.com

Language: English - Date: 2015-08-12 02:55:36
38Software / Computing / System software / Formal languages / Pattern matching / Cryptographic software / Cross-platform software / OpenSSL / Diff utility / Software quality / Software bug / Regular expression

Tracking Code Patterns over Multiple Software Versions with Herodotos Nicolas Palix DIKU University of Copenhagen Denmark

Add to Reading List

Source URL: coccinelle.lip6.fr

Language: English
39Computing / Software / Free software / Dark web / Secure communication / Cryptographic software / Tor / I2P / Onion routing / HTTPS / Mixminion / Internet Relay Chat

Revisiting Circuit Clogging Attacks on Tor Eric Chan-Tin, Jiyoung Shin and Jiangmin Yu Department of Computer Science Oklahoma State University {chantin, jiyoung, jiangmy}@cs.okstate.edu Abstract—Tor is a popular anony

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2013-11-08 14:52:20
40Computing / Internet / Cryptography / Computer network security / Internet Standards / Directory services / Cryptographic protocols / Secure communication / Safe Software / Kerberos / Transport Layer Security / HTTPS

FME® Server Security Table of Contents FME Server Authentication - Access Control

Add to Reading List

Source URL: cdn.safe.com

Language: English - Date: 2015-07-30 16:36:24
UPDATE