OpenSSL

Results: 352



#Item
131Cyberwarfare / Cryptographic protocols / Secure communication / Transport Layer Security / OpenSSL / Vulnerability / Password / Black Duck Software / Computing / Computer security / Cryptographic software

PDF Document

Add to Reading List

Source URL: safety.addalot.se

Language: English
132Computer security / Computing / Computer network security / Crime prevention / National security / OpenSSL / Password / Transport Layer Security / Vulnerability / Security / Electronic commerce / Secure communication

PDF Document

Add to Reading List

Source URL: www.elliottdavis.com

Language: English - Date: 2014-04-30 16:48:21
133Internet access / National Telecommunications and Information Administration / Social vulnerability / Sociology

On April 8, 2014, a security advisory that outlined a vulnerability discovered in OpenSSL and called for measures to be taken was published, and a range of companies were forced to take urgent action. OpenSSL is open sou

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-10-02 05:25:02
134RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:13
135Remote desktop / Cryptographic software / Cryptographic protocols / OpenSSL / Firefox / Internet protocols / Google Chrome / Internet Explorer / Citrix Systems / Software / Computing / Secure communication

List of Operating Systems, Browsers, and Servers Which Support SHA-256 Hashes in SSL Certificates Revised as of: September 22, 2014

Add to Reading List

Source URL: casecurity.org

Language: English - Date: 2014-09-24 16:22:29
136Security / Common Criteria / Protection Profile / National Information Assurance Partnership / Evaluation Assurance Level / FIPS 140-2 / Lumeta Corporation / Security Target / OpenSSL / Computer security / Evaluation / Computing

Lumeta IPsonar 5.5C The Significance of Common Criteria, Protection Profiles, and Lumeta IPsonar

Add to Reading List

Source URL: www.lumeta.com

Language: English - Date: 2014-06-17 16:24:16
137Internet Protocol / Sendmail / Mach / OpenSSL / Berkeley Software Distribution / FreeBSD / Extended SMTP / IPv6 / Darwin / Computing / System software / Software

 SENDMAIL  RELEASE  NOTES  $Id:  RELEASE_NOTES,v  8.2043    20:27:19   ca  Exp  $     This  listing  shows  the  version  of  the  sendmail  binary,

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2014-01-27 17:29:02
138Secure communication / System software / Software / Internet protocols / OpenSSL / Transport Layer Security / OpenVPN / HTTP Secure / Comparison of TLS Implementations / Cryptographic software / Computing / Cryptographic protocols

EARLY CCS ATTACK ANALYSIS June 6, BACKGROUND

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-06-06 18:35:24
139Cryptographic software / Cryptography standards / Cross-platform software / Advanced Encryption Standard / X86 architecture / OpenSSL / FIPS 140-2 / GNU Compiler Collection / FIPS 140 / Software / Computing / Cryptography

OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2012-06-13 10:35:30
140Secure communication / Cryptographic software / Cryptographic protocols / OpenSSL / Firefox / Internet protocols / Citrix Systems / Google Chrome / Internet Explorer / Software / Computing / Remote desktop

List of Operating Systems, Browsers, and Servers Which Support SHA-256 Hashes in SSL Certificates Revised as of: September 22, 2014 The CA Security Council (CASC) has compiled the following lists of operating systems (OS

Add to Reading List

Source URL: casecurity.org

Language: English - Date: 2014-09-24 16:22:27
UPDATE