Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
106 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 185-203, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
72 | Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage |
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, Illinois, USA, November 4-6, 2009, pp. 15-27, 2009, ACM, 978-1-60558-771-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
debian, openssl, entropy, survey, attacks, prng |
72 | Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi |
An efficient implementation of trusted channels based on openssl. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 41-50, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation |
59 | Onur Aciiçmez, Werner Schindler |
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 256-273, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication |
51 | Sung-Ja Choi, Yeon-hee Kang, Gang-Soo Lee |
A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 215-224, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | David Ahmad |
Two Years of Broken Crypto: Debian's Dress Rehearsal for a Global PKI Compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(5), pp. 70-73, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 427-441, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
34 | Onur Aciiçmez, Jean-Pierre Seifert |
Cheap Hardware Parallelism Implies Cheap Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pp. 80-91, 2007, IEEE Computer Society, 0-7695-2982-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Vipul Gupta, Douglas Stebila, Sheueling Chang Shantz |
Integrating elliptic curve cryptography into the web's security infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Alternate Track Papers & Posters) ![In: Proceedings of the 13th international conference on World Wide Web - Alternate Track Papers & Posters, WWW 2004, New York, NY, USA, May 17-20, 2004, pp. 402-403, 2004, ACM, 1-58113-912-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
openSSL, elliptic curve cryptography, apache, mozilla |
26 | Claudio Alessio, Andrea Vesco |
A Novel DID Method Leveraging the IOTA Tangle and its Integration into OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.01087, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Claudio Alessio, Andrea Vesco |
A Novel DID Method Leveraging the IOTA Tangle and Its Integration into OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BLOCKCHAIN ![In: Blockchain and Applications, 5th International Congress, BLOCKCHAIN 2023, Guimaraes, Portugal, 12-14 July 2023., pp. 394-404, 2023, Springer, 978-3-031-45154-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Chihiro Tomita, Makoto Takita, Kazuhide Fukushima, Yuto Nakano, Yoshiaki Shiraishi, Masakatu Morii |
Extracting the Secrets of OpenSSL with RAMBleed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(9), pp. 3586, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Parker Hanson, Benjamin Winters, Eric Mercer, Brett Decker |
Verifying the SHA-3 Implementation from OpenSSL with the Software Analysis Workbench. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIN ![In: Model Checking Software - 28th International Symposium, SPIN 2022, Virtual Event, May 21, 2022, Proceedings, pp. 97-113, 2022, Springer, 978-3-031-15076-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | James Walden |
OpenSSL 3.0.0: An exploratory case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: 19th IEEE/ACM International Conference on Mining Software Repositories, MSR 2022, Pittsburgh, PA, USA, May 23-24, 2022, pp. 735-737, 2022, ACM, 978-1-4503-9303-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Cesar Pereida García |
Side-Channel Analysis and Cryptography Engineering: Getting OpenSSL Closer to Constant-Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
26 | Brett Decker, Benjamin Winters, Eric Mercer |
Towards Verifying SHA256 in OpenSSL with the Software Analysis Workbench. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NFM ![In: NASA Formal Methods - 13th International Symposium, NFM 2021, Virtual Event, May 24-28, 2021, Proceedings, pp. 72-78, 2021, Springer, 978-3-030-76383-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | James Walden |
The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.14242, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Stanislav S. Malakhov |
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 97, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | James Walden |
The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: MSR '20: 17th International Conference on Mining Software Repositories, Seoul, Republic of Korea, 29-30 June, 2020, pp. 409-419, 2020, ACM, 978-1-4503-7517-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley |
Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL's protection on ARM and Intel CPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 71, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Vincenzo DiLuoffo, William R. Michalson, Berk Sunar |
Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.09179, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Jizhi Wang |
The Prediction of Serial Number in OpenSSL's X.509 Certificate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2019, pp. 6013846:1-6013846:11, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Akira Takahashi 0002, Mehdi Tibouchi |
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 400, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Akira Takahashi 0002, Mehdi Tibouchi |
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, pp. 371-386, 2019, IEEE, 978-1-7281-1148-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Hyunki Kim, Jinhyeok Oh, Changuk Jang, Okyeon Yi, Juhong Han, Hansaem Wi, Chanil Park |
Analysis of the Noise Source Entropy Used in OpenSSL's Random Number Generation Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: 2019 International Conference on Information and Communication Technology Convergence, ICTC 2019, Jeju Island, Korea (South), October 16-18, 2019, pp. 59-62, 2019, IEEE, 978-1-7281-0893-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Wenbo Wang, Shuqin Fan |
Attacking OpenSSL ECDSA with a small amount of side-channel information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 61(3), pp. 032105:1-032105:14, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Urbi Chatterjee, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Sweta Pati, Debashis Mahata, Mukesh M. Prabhu |
PUFSSL: An OpenSSL Extension for PUF based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSP ![In: 23rd IEEE International Conference on Digital Signal Processing, DSP 2018, Shanghai, China, November 19-21, 2018, pp. 1-5, 2018, IEEE, 978-1-5386-6811-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley |
OpenSSL Bellcore's Protection Helps Fault Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 21st Euromicro Conference on Digital System Design, DSD 2018, Prague, Czech Republic, August 29-31, 2018, pp. 500-507, 2018, IEEE Computer Society, 978-1-5386-7377-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Locke Callan, Alenka G. Zajic, Milos Prvulovic |
One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018., pp. 585-602, 2018, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
26 | Chunhua Xiao, Yuhua Xie, Lei Zhang 0072 |
AEAS - Towards High Energy-efficiency Design for OpenSSL Encryption Acceleration through HW/SW Co-design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 2018 on Great Lakes Symposium on VLSI, GLSVLSI 2018, Chicago, IL, USA, May 23-25, 2018, pp. 171-176, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Martin Ukrop, Vashek Matyas |
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings, pp. 45-64, 2018, Springer, 978-3-319-76952-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yuval Yarom, Daniel Genkin, Nadia Heninger |
CacheBleed: a timing attack on OpenSSL constant-time RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 7(2), pp. 99-112, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Christian Janze |
Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bled eConference ![In: 30th Bled eConference: Digital Transformation - From Connecting Things to Transforming our Lives, Bled, Slovenia, June 18-21, 2017, pp. 33, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
26 | Denis Butin, Julian Wälde, Johannes Buchmann 0001 |
Post-quantum authentication in OpenSSL with hash-based signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMU ![In: Tenth International Conference on Mobile Computing and Ubiquitous Network, ICMU 2017, Toyama, Japan, October 3-5, 2017, pp. 1-6, 2017, IEEE, 978-4-907626-31-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Yuval Yarom, Daniel Genkin, Nadia Heninger |
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 224, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
26 | Falko Strenzke |
An Analysis of OpenSSL's Random Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 367, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
26 | Shuqin Fan, Wenbo Wang, Qingfeng Cheng |
Attacking OpenSSL Implementation of ECDSA with a Few Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 1505-1515, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Pasquale Malacaria, Michael Tautschnig, Dino Distefano |
Information Leakage Analysis of Complex C Code and Its application to OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA (1) ![In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part I, pp. 909-925, 2016, 978-3-319-47165-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Matthieu Jimenez, Mike Papadakis, Yves Le Traon |
An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 23rd Asia-Pacific Software Engineering Conference, APSEC 2016, Hamilton, New Zealand, December 6-9, 2016, pp. 105-112, 2016, IEEE Computer Society, 978-1-5090-5575-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Falko Strenzke |
An Analysis of OpenSSL's Random Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, pp. 644-669, 2016, Springer, 978-3-662-49889-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Joeri de Ruiter |
A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings, pp. 169-184, 2016, 978-3-319-47559-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Debapriya Basu Roy, Shubham Agrawal, Chester Rebeiro, Debdeep Mukhopadhyay |
Accelerating OpenSSL's ECC with low cost reconfigurable hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIC ![In: International Symposium on Integrated Circuits, ISIC 2016, Singapore, December 12-14, 2016, pp. 1-4, 2016, IEEE, 978-1-4673-9019-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Yuval Yarom, Daniel Genkin, Nadia Heninger |
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, pp. 346-367, 2016, Springer, 978-3-662-53139-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Soo Hyeon Kim, Daewan Han, Dong Hoon Lee 0002 |
Practical Effect of the Predictability of Android OpenSSL PRNG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(8), pp. 1806-1813, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | David Wong 0003 |
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 839, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
26 | Yongge Wang, Tony Nicol |
On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 53, pp. 44-64, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel |
Verified Correctness and Security of OpenSSL HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015., pp. 207-221, 2015, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
26 | Yuval Yarom, Naomi Benger |
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 140, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
26 | Poul-Henning Kamp |
Please Put OpenSSL Out of Its Misery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 12(3), pp. 20-23, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng |
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014, pp. 520-524, 2014, IEEE Computer Society, 978-1-4799-4171-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Yongge Wang, Tony Nicol |
Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (1) ![In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, pp. 454-471, 2014, Springer, 978-3-319-11202-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Soo Hyeon Kim, Daewan Han, Dong Hoon Lee 0002 |
Predictability of Android OpenSSL's pseudo random number generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013, pp. 659-668, 2013, ACM, 978-1-4503-2477-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Johannes Gilger, Johannes Barnickel, Ulrike Meyer |
GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 338-353, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Emilia Käsper |
Fast Elliptic Curve Cryptography in OpenSSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography Workshops ![In: Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers, pp. 27-39, 2011, Springer, 978-3-642-29888-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Julia Lawall, Ben Laurie, René Rydhof Hansen, Nicolas Palix, Gilles Muller |
Finding Error Handling Bugs in OpenSSL Using Coccinelle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Eighth European Dependable Computing Conference, EDCC-8 2010, Valencia, Spain, 28-30 April 2010, pp. 191-196, 2010, IEEE Computer Society, 978-0-7695-4007-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Li Gui-hong, Zheng Hua, Li Gui-zhi |
Building a Secure Web Server Based on OpenSSL and Apache. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEE ![In: The International Conference on E-Business and E-Government, ICEE 2010, 7-9 May 2010, Guangzhou, China, Proceedings, pp. 1307-1310, 2010, IEEE Computer Society, 978-0-7695-3997-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Vishnu P. Nambiar, Mohamed Khalil Hani, Muhammad Munim Ahmad Zabidi |
Accelerating the AES encryption function in OpenSSL for embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Commun. Technol. ![In: Int. J. Inf. Commun. Technol. 2(1/2), pp. 83-93, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Martin Bartosch |
Das OpenSSL-Debakel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 32(8), pp. 511-514, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 39, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
26 | Marc Joye, Michael Tunstall |
Securing OpenSSL against Micro-Architectural Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 189-196, 2007, INSTICC Press, 978-989-8111-12-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
26 | Ben Laurie |
Apache/OpenSSL/DNSSEC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 19th Conference on Systems Administration (LISA 2005), December 4-9, 2005, San Diego, California, USA, 2005, USENIX. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
26 | John Viega, Matt Messier, Pravir Chandra |
Network security using OpenSSL - cryptography for secure communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2002 |
RDF |
|
17 | Gregory S. Thomas, Bill Nickless, David R. Thiede, Ian Gorton, Bill J. Pitre, Jason E. Christy, Liz Faultersack, Jeffery A. Mauth |
T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 468-472, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, Gerardo Pelosi |
Design of a parallel AES for graphics hardware using the CUDA framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-8, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Billy Bob Brumley, Risto M. Hakala |
Cache-Timing Template Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 667-684, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cache-timing attacks, elliptic curve cryptography, side channel attacks |
17 | Ray-Yaung Chang, Andy Podgurski, Jiong Yang 0001 |
Discovering Neglected Conditions in Software by Mining Dependence Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 34(5), pp. 579-596, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Diana Berbecaru, Luca Albertalli |
An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 13-15 February 2008, Toulouse, France, pp. 581-589, 2008, IEEE Computer Society, 978-0-7695-3089-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
generic FSS schemes, double cache technique, backward secrecy |
17 | Florina Almenárez, Andrés Marín López, Daniel Díaz Sánchez, Alberto Cortés, Celeste Campo, Carlos García-Rubio |
Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 560-565, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
certificate validation, open toolkit, X.509 certificates |
17 | Danilo Gligoroski, Suzana Andova, Svein J. Knapskog |
On the Importance of the Key Separation Principle for Different Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 404-418, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
quasigroup string transformations, block ciphers, modes of operation |
17 | Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger |
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 349-365, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation |
17 | Laurent Bernaille, Renata Teixeira |
Early Recognition of Encrypted Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Network Measurement, 8th Internatinoal Conference, PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, Proceedings, pp. 165-175, 2007, Springer, 978-3-540-71616-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert |
Predicting Secret Keys Via Branch Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 225-242, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation |
17 | Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel Lussenburg, Felix Rauch |
Model Checking Software at Compile Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TASE ![In: First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, TASE 2007, June 5-8, 2007, Shanghai, China, pp. 45-56, 2007, IEEE Computer Society, 0-7695-2856-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(2), pp. 128-143, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
17 | Guido Rotondi, Gianpiero Guerrera |
A consistent history authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(3), pp. 1-7, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dentification, authentication, trust, non repudiation, SSL |
17 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(4), pp. 5, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
17 | Martin Hlavác, Tomás Rosa |
Extended Hidden Number Problem and Its Cryptanalytic Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers, pp. 114-133, 2006, Springer, 978-3-540-74461-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DSA implementation, hyper-threading, lattice, sliding window, side channel analysis, cache analysis |
17 | Ji Wang 0001, Xiaodong Yi 0002, Xuejun Yang |
Towards a Framework for Scalable Model Checking of Concurrent C Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15-19 November 2006, pp. 355-362, 2006, IEEE Computer Society, 978-0-7695-3071-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Allen Michalski, Duncan A. Buell |
A Scalable Architecture for RSA Cryptography on Large FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006, pp. 1-8, 2006, IEEE, 1-4244-0312-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel Lussenburg, Felix Rauch |
Goanna - A Static Model Checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMICS/PDMC ![In: Formal Methods: Applications and Technology, 11th International Workshop, FMICS 2006 and 5th International Workshop PDMC 2006, Bonn, Germany, August 26-27, and August 31, 2006, Revised Selected Papers, pp. 297-300, 2006, Springer, 978-3-540-70951-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Dag Arne Osvik, Adi Shamir, Eran Tromer |
Cache Attacks and Countermeasures: The Case of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 1-20, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, memory access |
17 | Chang Liu 0028, En Ye, Debra J. Richardson |
Software Library Usage Pattern Extraction Using a Software Model Checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 18-22 September 2006, Tokyo, Japan, pp. 301-304, 2006, IEEE Computer Society, 0-7695-2579-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Joseph Bonneau, Ilya Mironov |
Cache-Collision Timing Attacks Against AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 201-215, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, timing attack |
17 | Takahiro Shinagawa |
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006),2-4 October 2006, Leeds, UK, pp. 277-288, 2006, IEEE Computer Society, 0-7695-2677-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç |
Improving Brumley and Boneh timing attack on unprotected SSL implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 139-146, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
RSA, timing attacks, side-channel cryptanalysis |
17 | Jean Goubault-Larrecq, Fabrice Parrennes |
Cryptographic Protocol Analysis on Real C Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMCAI ![In: Verification, Model Checking, and Abstract Interpretation, 6th International Conference, VMCAI 2005, Paris, France, January 17-19, 2005, Proceedings, pp. 363-379, 2005, Springer, 3-540-24297-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Xiaodong Yi 0002, Ji Wang 0001, Xuejun Yang |
Verification of C Programs using Slicing Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSIC ![In: Fifth International Conference on Quality Software (QSIC 2005), 19-20 September 2005, Melbourne, Australia, pp. 109-116, 2005, IEEE Computer Society, 0-7695-2472-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith |
Modular Verification of Software Components in C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 30(6), pp. 388-402, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | José A. Montenegro, Fernando Moya |
A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 160-172, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Jinlin Yang, David Evans 0001 |
Automatically Inferring Temporal Properties for Program Evolution . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2-5 November 2004, Saint-Malo, Bretagne, France, pp. 340-351, 2004, IEEE Computer Society, 0-7695-2215-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Christian Rinderknecht |
Proving a Soundness Property for the Joint Design of ASN.1 and the Basic Encoding Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAM ![In: System Analysis and Modeling, 4th International SDL and MSC Workshop, SAM 2004, Ottawa, Canada, June 1-4, 2004, Revised Selected Papers, pp. 154-170, 2004, Springer, 3-540-24561-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Abstract Syntax Notation One, Basic Encoding Rules, formal methods, protocol, specification, vulnerabilities, BER, ASN.1 |
17 | Sagar Chaki, Edmund M. Clarke, Joël Ouaknine, Natasha Sharygina, Nishant Sinha 0001 |
State/Event-Based Software Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFM ![In: Integrated Formal Methods, 4th International Conference, IFM 2004, Canterbury, UK, April 4-7, 2004, Proceedings, pp. 128-147, 2004, Springer, 3-540-21377-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 165-179, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Analyzing the energy consumption of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003, Seoul, Korea, August 25-27, 2003, pp. 30-35, 2003, ACM, 1-58113-682-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
17 | Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith |
Modular Verification of Software Components in C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 25th International Conference on Software Engineering, May 3-10, 2003, Portland, Oregon, USA, pp. 385-395, 2003, IEEE Computer Society, 0-7695-1877-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Panu Hämäläinen, Marko Hännikäinen, Markku Niemi, Timo Hämäläinen 0001 |
Performance evaluation of Secure Remote Password protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (3) ![In: Proceedings of the 2002 International Symposium on Circuits and Systems, ISCAS 2002, Scottsdale, Arizona, USA, May 26-29, 2002, pp. 29-32, 2002, IEEE, 0-7803-7448-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel F. Finchelstein, Edouard Goupy, Douglas Stebila |
An End-to-End Systems Approach to Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 349-365, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|