dmoz.org
DMOZ - Science: Publications: Archives: Free Access Online Archives
http://www.dmoz.org/Science/Publications/Archives/Free_Access_Online_Archives
Visit DMOZ on Facebook. Visit DMOZ on Twitter. Free Access Online Archives. Free Access Online Archives. Electronic Archives listed in this category provide free and unrestricted access to peer reviewed scientific papers and academic publications. Most of these archives run Eprints, a freeware for self-archiving and building OAI compliant metadata for papers. Bergen Open Research Archive (BORA). Caltech Computer Science Technical Reports. Caltech Earthquake Engineering Research Laboratory. Preprints by m...
iacr.org
Publications of the IACR
http://www.iacr.org/publications
International Association for Cryptologic Research. Publications of the IACR. IACR maintains multiple forms of publications:. The Proceedings from IACR conferences and workshops. Proceedings of IACR conferences and workshops are published by Springer in their LNCS series. Publication in an IACR proceedings is very prestigious and equivalent to a journal publication in other disciplines. From 2000 our proceedings can also be found in the IACR Archive (see below), after a two year delay. Ie, number of acce...
lcrypto.com
Зарубежные - lcrypto
http://www.lcrypto.com/Conference/zarubeznye
1 Международный семинар по постквантовой криптографии. PQCrypto, The International Workshop on Post-Quantum Cryptography (. Дармштадт, Германия) -. 2 Западноевропейский семинар по исследованиям в области криптографии (. WEWoRC, Western European Workshop on Research in Cryptology ). И сетевой безопасности (. И сетевой безопасности (. ACNS , International Conference on Applied Cryptography and Network Security ) - ссылка. Крипто (Crypto) международная конференция - ссылка.
cryptanalysis.eu
SSLv3 considered to be insucure – How the POODLE attack works in detail | Cryptanalysis - breaking news
https://cryptanalysis.eu/blog/2014/10/15/sslv3-considered-to-be-insucure-how-the-poodle-attack-works-in-detail
Cryptanalysis – breaking news. SSLv3 considered to be insucure – How the POODLE attack works in detail. POODLE is a recent attack on SSLv3. This article will explain the attack in detail:. On SSL Version 3, that sometimes allows an attacker to decrypt a single byte of an SSLv3 protected conversation. Repeating the attack might allow an attacker to decrypt multiple bytes of a secret (for example Session-Cookie, Password…) that is repeatedly send. When can the POODLE attack be applied? Modify any data that...
cryptanalysis.eu
misc | Cryptanalysis - breaking news
https://cryptanalysis.eu/blog/category/misc
Cryptanalysis – breaking news. Miscellaneous bits that don’t fit elsewhere. Bypassing certificate checks in OpenSSL 1.0.2c (CVE-2015-1793). Today, OpenSSL 1.0.2d. Has been released. Many lines of code have been changed, but most important is a Security Fix that allowed an attacker to bypass certain checks on certificates. The problem is summarized in the changelog of the new release. Changes between 1.0.2c and 1.0.2d [9 Jul 2015]. Alternate chains certificate forgery. How does certificate validation work?
cryptanalysis.eu
Bypassing certificate checks in OpenSSL 1.0.2c (CVE-2015-1793) | Cryptanalysis - breaking news
https://cryptanalysis.eu/blog/2015/07/09/bypassing-certificate-checks-in-openssl-1-0-2c-cve-2015-1793
Cryptanalysis – breaking news. Bypassing certificate checks in OpenSSL 1.0.2c (CVE-2015-1793). Today, OpenSSL 1.0.2d. Has been released. Many lines of code have been changed, but most important is a Security Fix that allowed an attacker to bypass certain checks on certificates. The problem is summarized in the changelog of the new release. Changes between 1.0.2c and 1.0.2d [9 Jul 2015]. Alternate chains certificate forgery. How does certificate validation work? How does the attack work? Certificate with ...
network-privacy.org
Network Privacy
http://www.network-privacy.org/de/books/ios-entwicklung.html
Sicher in sozialen Netzwerken. Facebook, Twitter and Co. - Aber Sicher! SEO und Social Media im Einsatz. Theorie, Techniken and Trends. UI- und UX-Design / Frameworks / Apple Watch / Multitasking und mehr. Thomas Sillmann (Hrsg.), Kristin Rothe (Initiatorin), Raphael Arias, Marcus Ross, Karolina Schilling, Robert Weller, Manuel Ziegler. Umschlagdesign: Marc Müller-Bremer,. Das letzte Kapitel von Robert Weller beschäftigt sich mit der Vermarkung von Apps und dürfte vor allem den Projektmanagerinnen und Ma...
souravsengupta.com
Sen Gupta | Sourav
http://www.souravsengupta.com/index.html
R C Bose Centre. R C Bose Centre for Cryptology and Security. Indian Statistical Institute, Kolkata. 91 (33) 2575 2037 (Office). Room 404, 3rd Floor, Deshmukh Building. Computing for Data Sciences. Programming and DS Lab. Visit the course websites for further details. I am a Researcher, positioned precariously at the confluence of Computer Science, Mathematics and Engineering, and I study the art and science of Cryptology and Information Security. My research inclination follows two apparently diverse tr...
people.csail.mit.edu
Ronald L. Rivest : Cryptography and Security
http://people.csail.mit.edu/rivest/crypto-security.html
No longer maintained - link farms seem out-of-date now that search engines are so good! This page contains pointers to other web pages dealing with cryptography and security, organized into the following sections:. Other compilations of links. Non-Profit Organizations and Associations. University Sites and Course Material. News Groups, Newsletters, and FAQ's. Algorithms, Protocols, Etc. Also see the IACR Calendar. And the Cipher Newsletter calendar. 12/3/00- 12/7/00; deadline 5/25/00; Kyoto, Japan).