OpenSSL

Results: 352



#Item
71RELIC is an Efficient LIbrary for Cryptography Diego F. Aranha Department of Computer Science University of Bras´ılia  Relic

RELIC is an Efficient LIbrary for Cryptography Diego F. Aranha Department of Computer Science University of Bras´ılia Relic

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:05
72`  Technical Bulletin April 11, 2014  Addressing the OpenSSL “Heartbleed” vulnerability in

` Technical Bulletin April 11, 2014 Addressing the OpenSSL “Heartbleed” vulnerability in

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2014-04-11 13:28:16
    731  A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

    1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

    Add to Reading List

    Source URL: smacktls.com

    Language: English - Date: 2015-03-05 00:10:02
    74Patent Licen se for OpenSSL 1. Definition s 1.1

    Patent Licen se for OpenSSL 1. Definition s 1.1 " Licensor" means Phillip Rogaway. orOne Shields Avenue, Davis, CA " Licensed Patents" means any patent that claims priority to United States Patent Applica

    Add to Reading List

    Source URL: openssl.org

    Language: English - Date: 2015-08-15 21:28:41
    75Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f

    Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2014-12-23 10:16:22
    76From: Andrew Lewman, Executive Director To: The Tor Community Date: February 12, 2012 This report documents progress in January 2012.

    From: Andrew Lewman, Executive Director To: The Tor Community Date: February 12, 2012 This report documents progress in January 2012.

    Add to Reading List

    Source URL: archive.torproject.org

    Language: English - Date: 2012-02-12 07:28:04
    77Secure Abstraction with Code Capabilities Robbert van Renesse∗ , H˚avard D. Johansen† , Nihar Naigaonkar∗ , and Dag Johansen† ∗ Cornell University, USA † University of Tromsø, Norway  Abstract—We propose

    Secure Abstraction with Code Capabilities Robbert van Renesse∗ , H˚avard D. Johansen† , Nihar Naigaonkar∗ , and Dag Johansen† ∗ Cornell University, USA † University of Tromsø, Norway Abstract—We propose

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2012-11-08 10:00:02
    78Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

    Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

    Add to Reading List

    Source URL: people.redhat.com

    Language: English - Date: 2015-09-02 09:27:18
    79Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    801  Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2014-02-27 10:40:02