[go: up one dir, main page]

Breyha et al., 2014 - Google Patents

Applied crypto hardening

Breyha et al., 2014

View PDF
Document ID
1715100088467958742
Author
Breyha W
Durvaux D
Dussa T
Kaplan L
Mendel F
Mock C
Koschuch M
Kriegisch A
Pöschl U
Sabet R
San B
Schlatterbeck R
Schreck T
Würstlein A
Zauner A
Zawodsky P
Publication year

External Links

Snippet

Applied Crypto Hardening Page 1 Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, Ulrich Pöschl, Ramin Sabet, Berg San, Ralf Schlatterbeck, Thomas Schreck …
Continue reading at enos.itcollege.ee (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators

Similar Documents

Publication Publication Date Title
EP3479542B1 (en) Detecting attacks using compromised credentials via internal network monitoring
Bhargavan et al. Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
Barrett et al. SSH, the secure shell: the definitive guide
Ristic Bulletproof SSL and TLS: Understanding and deploying SSL/TLS and PKI to secure servers and web applications
US20150207783A1 (en) Encryption system using web browsers and untrusted web servers
Bansal et al. Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
EP2717539B1 (en) Method and system for hypertext transfer protocol digest authentication
Müller et al. Mailto: Me your secrets. on bugs and features in email end-to-end encryption
Breyha et al. Applied crypto hardening
Sabir et al. Design and implementation of an end-to-end web based trusted email system
Albrecht et al. Share with care: Breaking E2EE in Nextcloud
CN114389803B (en) SPA key distribution method and device
Baka et al. SSL/TLS under lock and key: a guide to understanding SSL/TLS cryptography
Suga SSL/TLS servers status survey about enabling forward secrecy
Paverd et al. Omnishare: Encrypted cloud storage for the multi-device era
Zink et al. X. 509 user certificate-based two-factor authentication for web applications
Ristic Openssl cookbook: A guide to the most frequently used openssl features and commands
Candra et al. Security analysis testing for secure instant messaging in android with study case: Telegram
Gilchrist The Concise Guide to SSL/TLS for DevOps
Easttom SSL/TLS
EP3871389B1 (en) Secure communication of payload data
CIERNIKOVA Selected open tools supporting security and privacy protection for regular end-users
EP3051770A1 (en) User opt-in computer implemented method for monitoring network traffic data, network traffic controller and computer programs
Baker Secure Web Application Development
Onik et al. A Systematic Literature Review of Secure Instant Messaging Applications from a Digital Forensics Perspective