Breyha et al., 2014 - Google Patents
Applied crypto hardeningBreyha et al., 2014
View PDF- Document ID
- 1715100088467958742
- Author
- Breyha W
- Durvaux D
- Dussa T
- Kaplan L
- Mendel F
- Mock C
- Koschuch M
- Kriegisch A
- Pöschl U
- Sabet R
- San B
- Schlatterbeck R
- Schreck T
- Würstlein A
- Zauner A
- Zawodsky P
- Publication year
External Links
Snippet
Applied Crypto Hardening Page 1 Applied Crypto Hardening Wolfgang Breyha, David
Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch,
Adi Kriegisch, Ulrich Pöschl, Ramin Sabet, Berg San, Ralf Schlatterbeck, Thomas Schreck …
- 101700075909 ARSA 0 description 69
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3479542B1 (en) | Detecting attacks using compromised credentials via internal network monitoring | |
Bhargavan et al. | Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS | |
Barrett et al. | SSH, the secure shell: the definitive guide | |
Ristic | Bulletproof SSL and TLS: Understanding and deploying SSL/TLS and PKI to secure servers and web applications | |
US20150207783A1 (en) | Encryption system using web browsers and untrusted web servers | |
Bansal et al. | Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage | |
EP2717539B1 (en) | Method and system for hypertext transfer protocol digest authentication | |
Müller et al. | Mailto: Me your secrets. on bugs and features in email end-to-end encryption | |
Breyha et al. | Applied crypto hardening | |
Sabir et al. | Design and implementation of an end-to-end web based trusted email system | |
Albrecht et al. | Share with care: Breaking E2EE in Nextcloud | |
CN114389803B (en) | SPA key distribution method and device | |
Baka et al. | SSL/TLS under lock and key: a guide to understanding SSL/TLS cryptography | |
Suga | SSL/TLS servers status survey about enabling forward secrecy | |
Paverd et al. | Omnishare: Encrypted cloud storage for the multi-device era | |
Zink et al. | X. 509 user certificate-based two-factor authentication for web applications | |
Ristic | Openssl cookbook: A guide to the most frequently used openssl features and commands | |
Candra et al. | Security analysis testing for secure instant messaging in android with study case: Telegram | |
Gilchrist | The Concise Guide to SSL/TLS for DevOps | |
Easttom | SSL/TLS | |
EP3871389B1 (en) | Secure communication of payload data | |
CIERNIKOVA | Selected open tools supporting security and privacy protection for regular end-users | |
EP3051770A1 (en) | User opt-in computer implemented method for monitoring network traffic data, network traffic controller and computer programs | |
Baker | Secure Web Application Development | |
Onik et al. | A Systematic Literature Review of Secure Instant Messaging Applications from a Digital Forensics Perspective |