Oracle attack

Results: 62



#Item
31JavaServer Faces / Java specification requests / Java platform / Apache MyFaces / Java Platform /  Enterprise Edition / ASP.NET / Java Servlet / Padding oracle attack / Jspx-bay / Computing / Web application frameworks / Java enterprise platform

Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:31
32Cyberwarfare / Session border controller / Session Initiation Protocol / Firewall / Denial-of-service attack / SIP Trunking / SIP connection / Real-time Transport Protocol / Application-level gateway / Voice over IP / Videotelephony / Computer network security

A Blueprint for Enterprise Session Border Controller - Whitepaper

Add to Reading List

Source URL: www.oracle.com

Language: English
33Computer network security / Computing / Hacking / Vulnerability / Security testing / Attack / Oracle Corporation / Web application security scanner / Software testing / Computer security / Cyberwarfare

Black-Box Security Testing for Web Applications and Services Dennis Appelt Software Verification and Validation Laboratory 17, December, 2013

Add to Reading List

Source URL: www.fnr.lu

Language: English
34Hashing / Search algorithms / Random oracle / Preimage attack / Hash function / Collision resistance / SHA-1 / Oracle machine / Collision / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft Word - Scott Contini.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:08:36
35Search algorithms / Error detection and correction / Hash function / Random oracle / Oracle machine / Preimage attack / Elliptic curve only hash / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:10:52
36Random oracle / HMAC / Collision resistance / Optimal asymmetric encryption padding / Hash function / Preimage attack / Collision / Ciphertext indistinguishability / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04
37CRYPTREC / Collision resistance / Random oracle / Preimage attack / HMAC / Hash function / Crypt / Outline of cryptography / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
38Search algorithms / Error detection and correction / Birthday attack / Hash function / Random oracle / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:51:10
39Cryptographic primitive / Random oracle / Man-in-the-middle attack / Transport Layer Security / Password / Cryptographic hash function / Key / Secure Shell / Deniable authentication / Cryptography / Cryptographic protocols / Secure communication

Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-15 15:00:33
40Advantage / Cipher / RSA / Random oracle / Probabilistic encryption / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:15:30
UPDATE