Cryptography standards

Results: 2254



#Item
441Cryptographic protocols / Electronic commerce / Internet standards / Public key certificate / X.509 / Certificate authority / Certificate server / Dynamic SSL / Cryptography / Public-key cryptography / Key management

Exporting SSL certificate for use in Sysax Multi Server Table of Contents 1. Exporting SSL certificate for use in Sysax Multi Server ................................................................... 1

Add to Reading List

Source URL: www.sysax.com

Language: English - Date: 2009-10-31 02:46:10
442Computing / Internet protocols / Internet standards / Computer network security / Hacking / Domain Name System Security Extensions / DNS spoofing / Time to live / Name server / Internet / Domain name system / Cryptography

EphPub: Toward Robust Ephemeral Publishing Emiliano De Cristofaro Claude Castelluccia INRIA Rhone Alpes, France University of California, Irvine

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2011-09-02 06:28:56
443Key management / Internet protocols / Internet standards / Online Certificate Status Protocol / OCSP stapling / X.509 / Revocation list / Certificate authority / Public key certificate / Cryptography / Public-key cryptography / Cryptographic protocols

Towards Short-Lived Certificates Emin Topalovic∗ , Brennan Saeta∗ , Lin-Shung Huang† , Collin Jackson† and Dan Boneh∗ ∗ Stanford University, {emint, saeta, dabo}@cs.stanford.edu † Carnegie Mellon University

Add to Reading List

Source URL: www.w2spconf.com

Language: English - Date: 2012-05-24 01:30:01
444Secure communication / Data / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / Cipher suite / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Computing

The Design and Implementation of Protocol-Based Hidden Key Recovery Eu-Jin Goh1 , Dan Boneh1 , Benny Pinkas2 , and Philippe Golle1 1 Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-07-21 17:54:06
445Weak key / GOST / Blowfish / Differential cryptanalysis / ICE / Khufu and Khafre / Block cipher / Ciphertext / Advantage / Cryptography / GOST standards / Key schedule

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
446Environment / Standards / Electronic commerce / Public key certificate / Public-key cryptography / Professional certification / Organic farming / Organic / Food politics / Organic food / Sustainability / Product certification

(TO BE PROVIDED ON COMPANY/ BUSINESS LETTERHEAD) EXPORTER’S / MANUFACTURER’S DECLARATION To Whom It May Concern I ………………………….…………………….. 1 of ………………………………

Add to Reading List

Source URL: www.organicfoodchain.com.au

Language: English - Date: 2015-03-12 05:28:00
447Preimage attack / MD5 / SHA-2 / Hash function / SHA-1 / Hash table / Collision attack / Padding / Tiger / Cryptographic hash functions / Cryptography / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
448Data / Cryptography / Internet protocols / HTTP / Internet standards / TLS-SRP / Password / Transport Layer Security / Phishing / Cryptographic protocols / Secure communication / Computing

Is it too late for PAKE? John Engler UC Berkeley 1 Chris Karlof

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
449HOTP / Cryptographic protocols / Hardware security module / PKCS / SecurID / Key Management Interoperability Protocol / One-time password / X Window System / PKCS11 / Cryptography / Internet protocols / Cryptography standards

Key Management SDKs Complete vendor-independent key management solution 01010101100100101101001101110010101011010101010 KEY MANAGEMENT

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2015-04-27 12:14:08
450Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE