Forward secrecy

Results: 40



#Item
11Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
12An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

Add to Reading List

Source URL: www.w2spconf.com

Language: English - Date: 2014-05-19 03:40:02
    13Security Now! #LOGJAM: Imperfect Forward Secrecy  This week on Security Now! ● ●

    Security Now! #LOGJAM: Imperfect Forward Secrecy  This week on Security Now! ● ●

    Add to Reading List

    Source URL: www.grc.com

    Language: English - Date: 2015-05-26 16:05:22
      14Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo  This article presents new protocols for onion routing anonymity networks. We define a pro

      Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2010-12-30 09:39:44
      15Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

      Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2012-01-13 10:28:23
      16Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

      Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2012-01-15 19:52:05
      17Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

      Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

      Add to Reading List

      Source URL: weakdh.org

      Language: English - Date: 2015-05-22 22:25:48
      18Post-quantum Authenticated Key Exchange from Ideal Lattices ¨ u¨ r Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg 1  Institute of Software, Chinese Academy of Sciences, China

      Post-quantum Authenticated Key Exchange from Ideal Lattices ¨ u¨ r Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg 1 Institute of Software, Chinese Academy of Sciences, China

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-04-09 11:41:32
      19Security and Privacy  Technology & Infrastructure Military Grade Encryption Cotap encrypts data in transit and at rest using AES 256-bit with perfect forward secrecy key

      Security and Privacy Technology & Infrastructure Military Grade Encryption Cotap encrypts data in transit and at rest using AES 256-bit with perfect forward secrecy key

      Add to Reading List

      Source URL: info.cotap.com

      Language: English - Date: 2015-05-24 17:10:19
      20

      PDF Document

      Add to Reading List

      Source URL: www.isecpartners.com

      Language: English - Date: 2014-09-04 15:37:42