OpenSSL

Results: 352



#Item
51Hiding in Public: File Management in Unsafe Conditions  Toronto Perl Mongers Hiding in Public: File Management in Unsafe Conditions

Hiding in Public: File Management in Unsafe Conditions Toronto Perl Mongers Hiding in Public: File Management in Unsafe Conditions

Add to Reading List

Source URL: churchturing.org

Language: English - Date: 2008-03-05 17:16:23
52The Matter of Heartbleed *Zakir Durumeric1 , James Kasten1 , David Adrian1 , J. Alex Halderman1 , Michael Bailey1,2 2

The Matter of Heartbleed *Zakir Durumeric1 , James Kasten1 , David Adrian1 , J. Alex Halderman1 , Michael Bailey1,2 2

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
53Vulnerabilities  At a glance Description  A look into software vulnerabilities, whether we are

Vulnerabilities At a glance Description A look into software vulnerabilities, whether we are

Add to Reading List

Source URL: www.kennasecurity.com

Language: English - Date: 2016-04-26 13:43:51
54Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
55Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
56Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 06:14:04
57Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-10-02 16:10:38
58Dashlane	Security	White	Paper	v2.8	  Dashlane	Security	Whitepaper March	2016	 1. General	Security	Principles	 a. Protection	of	User	Data	in	Dashlane

Dashlane Security White Paper v2.8 Dashlane Security Whitepaper March 2016 1. General Security Principles a. Protection of User Data in Dashlane

Add to Reading List

Source URL: www.dashlane.com

Language: English - Date: 2016-03-23 12:49:58
591  Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: mitls.org

Language: English
60Cryptography / Cryptographic software / Key management / Internet security / Transport Layer Security / OpenSSL / Heartbleed / Key / GNU Privacy Guard / Public-key cryptography / SHA-1 / Password

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-09-17 23:54:20