Cryptographic primitive

Results: 89



#Item
41The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed]  Jason L. Wright

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2003-06-16 01:39:22
42The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed]  Jason L. Wright

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2003-06-16 01:39:22
43The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed]  Jason L. Wright

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2003-06-16 01:39:22
44The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed]  Jason L. Wright

The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Columbia University [removed] Jason L. Wright

Add to Reading List

Source URL: www.openbsd.com

Language: English - Date: 2003-06-16 01:39:22
45Cryptography As An Operating System Service: A Case Study ANGELOS D. KEROMYTIS Columbia University JASON L. WRIGHT and THEO DE RAADT OpenBSD Project

Cryptography As An Operating System Service: A Case Study ANGELOS D. KEROMYTIS Columbia University JASON L. WRIGHT and THEO DE RAADT OpenBSD Project

Add to Reading List

Source URL: www.openbsd.com

Language: English - Date: 2006-12-09 23:39:37
46This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol

This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2013-03-06 18:15:10
47Microsoft Word - RFI SPAR-MPC[removed]docx

Microsoft Word - RFI SPAR-MPC[removed]docx

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
48Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL  if ((err = SSLHashSHA1.update(...)) != 0)

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
49Georgia SoftWorks Security: SSH Security Risks RED FLAG WARNINGS  Georgia SoftWorks

Georgia SoftWorks Security: SSH Security Risks RED FLAG WARNINGS Georgia SoftWorks

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2012-11-21 13:26:32
50Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30