Transport layer

Results: 2091



#Item
291Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-08-21 16:58:21
292Cryptography / Computing / Internet / Keyword cipher / Password / Obfuscation / Transport Layer Security / Four-square cipher / Classical cipher

AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps Fangda Cai, Hao Chen Yuanyi Wu

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:56
293Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

Add to Reading List

Source URL: tls.mbed.org

Language: English
294Public-key cryptography / Cryptographic software / Secure communication / E-commerce / Transport Layer Security / OpenSSL / RSA / Blinding / Mbed TLS / Cipher suite / Forward secrecy / Digital signature

Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

Add to Reading List

Source URL: people.redhat.com

Language: English - Date: 2015-09-02 09:27:18
295Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Certificate authorities / Root certificate / Extended Validation Certificate / Public key certificate / Android / X.509 / CAcert.org

A Tangled Mass: The Android Root Certificate Stores Narseo Vallina-Rodriguez Johanna Amann Christian Kreibich

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:17
296Internet protocols / Internet Standards / Internet security / Secure communication / Network performance / Transmission Control Protocol / Transport layer / Internet protocol suite / Out-of-order delivery / Tor / Stream Control Transmission Protocol / Hypertext Transfer Protocol

Reducing Latency in Tor Circuits with Unordered Delivery Michael F. Nowlan, David Wolinsky, and Bryan Ford Yale University Abstract Tor, the popular anonymous relay tool, incurs significant latency costs—partly due to

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-07-21 06:56:10
297Computing / Internet / Cryptography / Internet protocols / Internet Standards / Email / Transport Layer Security / Domain name system / Opportunistic TLS / Postfix / DNS-based Authentication of Named Entities / Simple Mail Transfer Protocol

Continuous Measurement Platforms can help Mitigate Pervasive Surveillance Julian Kornberger Carsten Bormann RAIM Workshop, Saturday, 2015–10–31, Yokohama, JP Introduction

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2016-01-05 05:04:04
298Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Certificate authority / Public key certificate / Digital signature / Domain Name System Security Extensions / Self-signed certificate / Witness

arXiv:1503.08768v2 [cs.CR] 23 NovKeeping Authorities “Honest or Bust” with Decentralized Witness Cosigning Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-11-23 23:32:06
299Wireless networking / Computing / Wireless sensor network / Data transmission / Routing protocols / Routing algorithms / Link-state routing protocol / Wireless ad hoc network / Mobile ad hoc network / Transport layer / Sensor node / Routing

The Emergence of a Networking Primitive in Wireless Sensor Networks doi:

Add to Reading List

Source URL: csl.stanford.edu

Language: English - Date: 2008-06-27 12:17:27
300Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
UPDATE