Cryptographic software

Results: 2705



#Item
91The Matter of Heartbleed *Zakir Durumeric1 , James Kasten1 , David Adrian1 , J. Alex Halderman1 , Michael Bailey1,2 2

The Matter of Heartbleed *Zakir Durumeric1 , James Kasten1 , David Adrian1 , J. Alex Halderman1 , Michael Bailey1,2 2

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
92Vulnerabilities  At a glance Description  A look into software vulnerabilities, whether we are

Vulnerabilities At a glance Description A look into software vulnerabilities, whether we are

Add to Reading List

Source URL: www.kennasecurity.com

Language: English - Date: 2016-04-26 13:43:51
93How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-05-24 15:16:00
94Faster and more secure packages in OpenBSD Marc Espie <> October 4, 2015  Marc Espie <>

Faster and more secure packages in OpenBSD Marc Espie <> October 4, 2015 Marc Espie <>

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2015-10-04 10:06:38
95Portroach, OpenBSD distfile scanner Jasper Lievisse Adriaanse EuroBSDCon 2015 http://portroach.openbsd.org/  [October 4, 2015]

Portroach, OpenBSD distfile scanner Jasper Lievisse Adriaanse EuroBSDCon 2015 http://portroach.openbsd.org/ [October 4, 2015]

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2015-10-04 08:04:39
96Strong Cryptography The Global Tide of Change by Arnold G. Reinhold No. 51

Strong Cryptography The Global Tide of Change by Arnold G. Reinhold No. 51

Add to Reading List

Source URL: object.cato.org

Language: English - Date: 2012-12-14 18:44:35
97Advanced	
  x86:	
    BIOS	
  and	
  System	
  Management	
  Mode	
  Internals	
   Trusted	
  Compu-ng	
  Technologies	
   Xeno	
  Kovah	
  &&	
  Corey	
  Kallenberg	
   LegbaCore,	
  LLC	
  

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   Trusted  Compu-ng  Technologies   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:12:02
98Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
99Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-10-16 08:19:35
100Images and dm-crypt and LVM2… Oh mount! Speaker Name and info Hal Pomeranz Deer Run Associates

Images and dm-crypt and LVM2… Oh mount! Speaker Name and info Hal Pomeranz Deer Run Associates

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2011-05-27 21:21:17