PKCS

Results: 351



#Item
21Attacking and fixing PKCS#11 Security Course, Ca’ Foscari,   Security APIs

Attacking and fixing PKCS#11 Security Course, Ca’ Foscari, Security APIs

Add to Reading List

Source URL: secgroup.dais.unive.it

- Date: 2016-04-28 05:10:58
    22Attacking and Fixing PKCS#11 Security Tokens M. Bortolozzo M. Centenaro  Università Ca’ Foscari

    Attacking and Fixing PKCS#11 Security Tokens M. Bortolozzo M. Centenaro Università Ca’ Foscari

    Add to Reading List

    Source URL: secgroup.dais.unive.it

    - Date: 2010-10-05 06:04:56
      23ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

      ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

      Add to Reading List

      Source URL: www.intelsecurity.com

      Language: English - Date: 2016-05-02 12:28:32
      24Private Key Management Version: 1.1 Global Payments Europe, s.r.o. Created

      Private Key Management Version: 1.1 Global Payments Europe, s.r.o. Created

      Add to Reading List

      Source URL: www.gpwebpay.cz

      Language: English - Date: 2016-08-01 14:50:14
      25Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Cryptography standards / X.509 / Internet Standards / PKCS / Code signing / Portable Executable / Public key certificate / Cryptographic Message Syntax

      Windows Authenticode Portable Executable Signature Format Version 1.0 — March 21, 2008  Abstract Authenticode® is a digital signature format that is used to determine the origin and integrity of software binaries. A

      Add to Reading List

      Source URL: download.microsoft.com

      Language: English - Date: 2008-07-29 12:01:34
      26All your private keys are belong to us  1 All your private keys are belong to us

      All your private keys are belong to us 1 All your private keys are belong to us

      Add to Reading List

      Source URL: trapkit.de

      Language: English
      27Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

      Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

      Add to Reading List

      Source URL: www.bouncycastle.org

      Language: English - Date: 2016-08-02 22:30:34
      28LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

      LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

      Add to Reading List

      Source URL: www.spyrus.com

      Language: English - Date: 2015-08-05 12:42:41
      29ATTACK Exporting Nonexportable Certificates THOMAS CANNON

      ATTACK Exporting Nonexportable Certificates THOMAS CANNON

      Add to Reading List

      Source URL: thomascannon.net

      Language: English - Date: 2015-09-20 19:09:08
      30Securing PKCS#11 HSM Deployments Hardware-based cryptography is a core technology for controlling risk in potentially hostile environments such as mobile, cloud and Internet of things. However, choosing, configuring, dep

      Securing PKCS#11 HSM Deployments Hardware-based cryptography is a core technology for controlling risk in potentially hostile environments such as mobile, cloud and Internet of things. However, choosing, configuring, dep

      Add to Reading List

      Source URL: cryptosense.com

      Language: English - Date: 2016-02-22 08:08:30