OpenSSL

Results: 352



#Item
61

Finding Error Handling Bugs in OpenSSL using Coccinelle Julia Lawall∗ , Ben Laurie† , Ren´e Rydhof Hansen‡ , Nicolas Palix∗ and Gilles Muller§ ∗ University of Copenhagen, Email: {julia,npalix}@diku.dk † Goo

Add to Reading List

Source URL: www.diku.dk

Language: English - Date: 2010-02-20 17:47:51
    62Secure communication / Public-key cryptography / Elliptic curve cryptography / Cryptographic protocols / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / HTTPS / Elliptic curve DiffieHellman / Handshaking / RSA

    A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

    Add to Reading List

    Source URL: securewww.esat.kuleuven.be

    Language: English
    63Internet security / Internet protocol suite / Network architecture / CVSS / POODLE / Nessus / OpenSSL

    Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed:

    Add to Reading List

    Source URL: rsync.net

    Language: English - Date: 2015-06-08 23:32:29
    64Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

    Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2016-01-06 07:34:05
    65Cryptography / Computing / Secure communication / Cryptographic protocols / Internet protocols / E-commerce / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / RSA / HTTPS

    On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2015-08-21 05:45:15
    66Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    67Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

    Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2016-01-06 06:14:04
    68Cryptographic software / Internet security / Object-oriented programming languages / OpenSSL / Data types / Subroutines / Coccinelle / D / Software bug / Scope / Relational operator / Printf format string

    Finding Error Handling Bugs in OpenSSL using Coccinelle Julia Lawall∗ , Ben Laurie† , Ren´e Rydhof Hansen‡ , Nicolas Palix∗ and Gilles Muller§ ∗ University of Copenhagen, Email: {julia,npalix}@diku.dk † Goo

    Add to Reading List

    Source URL: coccinelle.lip6.fr

    Language: English - Date: 2012-01-04 11:08:48
    69Secure communication / Cryptographic software / Cryptographic protocols / Internet protocols / Internet Standards / Transport Layer Security / OpenSSL / Cipher suite / GnuTLS / WolfSSL / Handshaking / HTTPS

    F LEX TLS A Tool for Testing TLS Implementations Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, and Karthikeyan Bhargavan INRIA Paris-Rocquencourt Abstract

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-21 19:32:47
    UPDATE