Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Proceedings ArticleDOI
Using Assurance Cases to Develop Iteratively Security Features Using Scrum
TL;DR: The use of security assurance cases is proposed to maintain a global view of the security claims as the feature is being developed iteratively and a process that enables the incremental development of security features while ensuring the security requirements of the feature are fulfilled.
Journal ArticleDOI
An Efficient Privacy-Preserving Multi-Keyword Query Scheme in Location Based Services
TL;DR: A novel efficient and privacy-preserving multi-keyword query scheme (PPMQ) over the outsourced cloud, which satisfies the requirements of the location and query content privacy protection, query efficiency, the confidentiality of LBS data and scalability regarding the data users.
Proceedings ArticleDOI
Certificate Transparency Using Blockchain
TL;DR: Wang et al. as discussed by the authors proposed a novel system called CTB that makes it impossible for a certificate authority to issue a certificate for a domain without obtaining consent from the domain owner, and they further make progress to equip CTB with certificate revocation mechanism.
Dissertation
The design and analysis of symmetric cryptosystems
TL;DR: A general forgery attack against the related message authentication schemes is described, as well as providing a common description of all known attacks against such schemes, and greatly expanding the number of known weak keys.
Journal ArticleDOI
Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures
TL;DR: The feasibility of the GPU as an accelerator to perform high‐speed encryption in server environments is investigated and optimized implementations of a conventional block cipher (AES) and new lightweight block ciphers (LEA, Chaskey, SIMON, SPECK, and SIMECK) across three new GPU architectures (Kepler, Maxwell, and Pascal).
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.