-
4
-
-
0028532579
-
Why cryptosystems fail
-
November
-
“Why Cryptosystems Fail”, Ross Anderson, Communications of the ACM, Vol.37, No.11 (November 1994), p.32.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32
-
-
Anderson, R.1
-
11
-
-
85077557927
-
-
posting to the cypherpunks mailing list, message-ID 84366802803808@-cs26.cs.auckland.ac.nz, 25 September
-
”How to break Netscape’s server key encryption”, Peter Gutmann, posting to the cypherpunks mailing list, message-ID 84366802803808@-cs26.cs.auckland.ac.nz, 25 September 1996.
-
(1996)
How to Break Netscape’s Server Key Encryption
-
-
Gutmann, P.1
-
12
-
-
85077557927
-
-
posting to the cypherpunks mailing list, message-ID 84373168812186@cs26.cs.auckland.-ac.nz, 26 September
-
”How to break Netscape’s server key encryption - Followup”, Peter Gutmann, posting to the cypherpunks mailing list, message-ID 84373168812186@cs26.cs.auckland.-ac.nz, 26 September 1996.
-
(1996)
How to Break Netscape’s Server Key Encryption - Followup
-
-
Gutmann, P.1
-
20
-
-
85077578231
-
-
posting to the cryptography@c2.net mailing list, message-ID 88531016604880@cs26.cs.auckland.-ac.nz, 21 January
-
“How to recover private keys for various Microsoft products”, Peter Gutmann, posting to the cryptography@c2.net mailing list, message-ID 88531016604880@cs26.cs.auckland.-ac.nz, 21 January 1998.
-
(1998)
How to Recover Private Keys for Various Microsoft Products
-
-
Gutmann, P.1
-
21
-
-
85077639391
-
-
posting to the cryptography@c2.net mailing list, message-ID 88650938015887@cs26.cs.auckland.-ac.nz, 4 February
-
“An update on MS private key (in)security issues”, Peter Gutmann, posting to the cryptography@c2.net mailing list, message-ID 88650938015887@cs26.cs.auckland.-ac.nz, 4 February 1998.
-
(1998)
An Update on MS Private Key (in)Security Issues
-
-
Gutmann, P.1
-
23
-
-
85077634777
-
-
posting to pem-dev@tis.com mailing list, message-ID 93Aug16.003350pdt.13997-2@well.sf.ca.us, 16 August
-
“Re: Purpose of PEM string”, Doug Porter, posting to pem-dev@tis.com mailing list, message-ID 93Aug16.003350pdt.13997-2@well.sf.ca.us, 16 August 1993.
-
(1993)
Re: Purpose of PEM String
-
-
Porter, D.1
-
26
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
January
-
“A Security Risk of Depending on Synchronized Clocks”, Li Gong, Operating Systems Review, Vol.26, No.1 (January 1992), p.49.
-
(1992)
Operating Systems Review
, vol.26
, Issue.1
, pp. 49
-
-
Gong, L.1
-
27
-
-
0002088427
-
A note on the use of timestamps as nonces
-
April
-
“A Note on the Use of Timestamps as Nonces”, B.Clifford Neuman and Stuart Stubblebine, Operating Systems Review, Vol.27, No.2 (April 1993), p.10.
-
(1993)
Operating Systems Review
, vol.27
, Issue.2
, pp. 10
-
-
Clifford Neuman, B.1
Stubblebine, S.2
-
29
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
Springer-Verlag Lecture Notes in Computer Science No.576, August
-
“Systematic Design of Two-Party Authentication Protocols”, Ray Bird, Inder Gopal, Amir Herzberg, Philippe Janson, Shay Kutten, Refik Molva, and Moti Yung, Advances in Cryptology (Crypto’91), Springer-Verlag Lecture Notes in Computer Science No.576, August 1991, p.44.
-
(1991)
Advances in Cryptology (Crypto'91)
, Issue.576
, pp. 44
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
30
-
-
21144468597
-
Kryptoknight authentication and key distribution system
-
Springer-Verlag Lecture Notes in Computer Science
-
“KryptoKnight Authentication and Key Distribution System”, Refik Molva, Gene Tsudik, Els Van Herreweghen and Stefano Zatti, Proceedings of the 1992 European Symposium on Research in Computer Security (ESORICS’92), Springer-Verlag Lecture Notes in Computer Science No.648, 1992, p.155.
-
(1992)
Proceedings of the 1992 European Symposium on Research in Computer Security (ESORICS’92)
, Issue.648
, pp. 155
-
-
Molva, R.1
Tsudik, G.2
van Herreweghen, E.3
Zatti, S.4
-
31
-
-
0029250361
-
The kryptoknight family of light-weight protocols for authentication and key distribution
-
February
-
“The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution”, Ray Bird, Inder Gopal, Amir Herzberg, Philippe Janson, Shay Kutten, Refik Molva, and Moti Yung, IEEE/ACM Transactions on Networking, Vol.3, No.1 (February 1995), p.31.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.1
, pp. 31
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
34
-
-
0030109276
-
The yaksha security system
-
March
-
“The Yaksha Security System”, Ravi Ganesan, Communications of the ACM, Vol.39, No.3 (March 1996), p.55.
-
(1996)
Communications of the ACM
, vol.39
, Issue.3
, pp. 55
-
-
Ganesan, R.1
-
36
-
-
85084159885
-
Jonah: Experience implementing PKIX reference freeware
-
“Jonah: Experience Implementing PKIX Reference Freeware”, Mary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Marcek, Ann Graham, Jim Wade, and Tom Sandlin, Proceedings of the 1999 Usenix Security Symposium, 1999, p.185.
-
(1999)
Proceedings of the 1999 Usenix Security Symposium
, pp. 185
-
-
Zurko, M.E.1
Wray, J.2
Morrison, I.3
Shanzer, M.4
Crane, M.5
Booth, P.6
McDermott, E.7
Marcek, W.8
Graham, A.9
Wade, J.10
Sandlin, T.11
-
38
-
-
0003900671
-
-
RFC 3161, August
-
“Internet X.509 Public Key Infrastructure: Time-Stamp Protocol (TSP)”, RFC 3161, Carlisle Adams, Pat Cain, Denis Pinkas, and Robert Zuccherato, August 2001.
-
(2001)
Internet X.509 Public Key Infrastructure: Time-Stamp Protocol (TSP)
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
-
39
-
-
85077535101
-
-
posting to the cypherpunks mailing list, message-ID 3238962F.1372@-ai.mit.edu, 12 September
-
“Re: A history of Netscape/MSIE problems”, Phillip Hallam-Baker, posting to the cypherpunks mailing list, message-ID 3238962F.1372@-ai.mit.edu, 12 September 1996.
-
(1996)
Re: A History of Netscape/MSIE Problems
-
-
Hallam-Baker, P.1
-
41
-
-
85077544702
-
-
posting to the openssl-dev mailing list, 4 April
-
“Re: “PRNG not seeded” in Window NT”, Pablo Royo, posting to the openssl-dev mailing list, 4 April 2000.
-
(2000)
Re: “PRNG Not Seeded” in Window NT
-
-
Royo, P.1
-
42
-
-
85077533072
-
-
posting to the openssl-users mailing list, 6 April
-
“Re: PRNG not seeded ERROR”, Carl Douglas, posting to the openssl-users mailing list, 6 April 2001.
-
(2001)
Re: PRNG Not Seeded ERROR
-
-
Douglas, C.1
-
43
-
-
85077523680
-
-
posting to the openssl-dev mailing list, 10 March
-
“Bug in 0.9.5 + fix”, Elias Papavassilopoulos, posting to the openssl-dev mailing list, 10 March 2000.
-
(2000)
Bug in 0.9.5 + Fix
-
-
Papavassilopoulos, E.1
-
47
-
-
85077595058
-
-
posting to the openssl-users mailing list, 22 August
-
“RE: having trouble with RAND_egd()”, Miha Wang, posting to the openssl-users mailing list, 22 August 2000.
-
(2000)
RE: Having Trouble with RAND_egd()
-
-
Wang, M.1
-
48
-
-
85077548039
-
-
jas’, posting to the openssl-users mailing list, 19 April
-
“Re: How to seed before generating key?”, ‘jas’, posting to the openssl-users mailing list, 19 April 2000.
-
(2000)
Re: How to Seed before Generating Key?
-
-
-
52
-
-
85077533072
-
-
posting to the openssl-users mailing list, 6 April
-
“Re: PRNG not seeded ERROR”, Carl Douglas, posting to the openssl-users mailing list, 6 April 2001.
-
(2001)
Re: PRNG Not Seeded ERROR
-
-
Douglas, C.1
-
56
-
-
85077556507
-
-
posting to the ntbugtraq@listserv.ntbugtraq.com mailing list, message-ID 5.1.0.14.0.20011217140633.-035a3a60@127.0.0.1, 17 December
-
“Re: Announcing Public Availability of NoHTML for Outlook 2000/2002”, Vesselin Bontchev, posting to the ntbugtraq@listserv.ntbugtraq.com mailing list, message-ID 5.1.0.14.0.20011217140633.-035a3a60@127.0.0.1, 17 December 2001.
-
(2001)
Re: Announcing Public Availability of NoHTML for Outlook 2000/2002
-
-
Bontchev, V.1
-
57
-
-
85077612196
-
IIS 4.0 SSL ISAPI filter can leak single buffer of plaintext (q244613)
-
17 April
-
“IIS 4.0 SSL ISAPI Filter Can Leak Single Buffer of Plaintext (Q244613)”, Microsoft Knowledge Base article Q244613, 17 April 2000.
-
(2000)
Microsoft Knowledge Base Article Q244613
-
-
-
58
-
-
85077600181
-
Patch available for windows multithreaded SSL ISAPI filter vulnerability
-
2 December
-
“Patch Available for Windows Multithreaded SSL ISAPI Filter Vulnerability”, Microsoft Security Bulletin MS99-053, 2 December 1999.
-
(1999)
Microsoft Security Bulletin MS99-053
-
-
|