Cryptographic software

Results: 2705



#Item
1TESTING CRYPTOGRAPHIC SECURITY IN YOUR APPLICATIONS Cryptosense provides state-of-the-art analysis software to help some of the world’s largest organizations eliminate the vulnerabilities caused by crypto misuse in the

TESTING CRYPTOGRAPHIC SECURITY IN YOUR APPLICATIONS Cryptosense provides state-of-the-art analysis software to help some of the world’s largest organizations eliminate the vulnerabilities caused by crypto misuse in the

Add to Reading List

Source URL: cryptosense.com

Language: English - Date: 2017-10-03 09:47:46
    2Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL  if ((err = SSLHashSHA1.update(...)) != 0)

    Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English
    3Towards Secure Integration of Cryptographic Software Steven Arzt1 Sarah Nadi2 Karim Ali1 Eric Bodden1 Sebastian Erdweg2 Mira Mezini2 1

    Towards Secure Integration of Cryptographic Software Steven Arzt1 Sarah Nadi2 Karim Ali1 Eric Bodden1 Sebastian Erdweg2 Mira Mezini2 1

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

      4Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

      Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      - Date: 2004-02-12 14:18:41
        5Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

        Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2006-06-02 21:42:44
        6Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

        Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

        Add to Reading List

        Source URL: css.csail.mit.edu

        Language: English - Date: 2016-01-29 11:50:05
        7Motivations  PRNG Security Model Java SecureRandom Analysis

        Motivations PRNG Security Model Java SecureRandom Analysis

        Add to Reading List

        Source URL: www-fourier.ujf-grenoble.fr

        Language: English - Date: 2014-03-31 06:15:11
        8Crypto Device Drivers ReleaseJuly 28, 2016  CONTENTS

        Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

        Add to Reading List

        Source URL: fast.dpdk.org

        Language: English - Date: 2016-07-28 16:30:34
        9How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

        How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

        Add to Reading List

        Source URL: www.nomoreransom.org

        Language: English - Date: 2016-07-25 04:33:34
        10CP-G10i-Flyer-v10.fh-2 [Converted]

        CP-G10i-Flyer-v10.fh-2 [Converted]

        Add to Reading List

        Source URL: www.cryptophone.de

        Language: English - Date: 2010-07-06 09:32:52