Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,628 papers from all fields of science
Search
Sign In
Create Free Account
FREAK
Known as:
FREAK exploit
, CVE-2015-0204
, Factoring RSA Export Keys
Expand
FREAK ("Factoring RSA Export Keys") is a security exploit of a cryptographic weakness in the SSL/TLS protocols introduced decades earlier for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
CRIME
Cloud computing
Export of cryptography from the United States
Google Chrome
Expand
Broader (2)
Cryptography
Transport Layer Security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Snapchat memory and youth digital sexual cultures: mediated temporality, duration and affect
Sarah Handyside
,
J. Ringrose
2017
Corpus ID: 152088376
Abstract This paper explores how the photo and video-sharing app Snapchat mediates memory and intimacy, using focus group data…
Expand
Highly Cited
2014
Highly Cited
2014
SPHORB: A Fast and Robust Binary Feature on the Sphere
Qiang Zhao
,
Wei Feng
,
Liang Wan
,
Jiawan Zhang
International Journal of Computer Vision
2014
Corpus ID: 15007954
In this paper, we propose SPHORB, a new fast and robust binary feature detector and descriptor for spherical panoramic images. In…
Expand
Highly Cited
2014
Highly Cited
2014
Thermal–visible registration of human silhouettes: A similarity measure performance evaluation
G. Bilodeau
,
Atousa Torabi
,
P. St-Charles
,
Dorra Riahi
2014
Corpus ID: 17842796
Review
2011
Review
2011
MULTIDIMENSIONAL LOCALIZED STRUCTURES IN OPTICAL AND MATTER-WAVE MEDIA: A TOPICAL SURVEY OF RECENT LITERATURE
D. Mihalache
2011
Corpus ID: 41064225
We perform a survey of some recent theoretical and experimental studies on multidimensional (twoand three-dimensional) localized…
Expand
Highly Cited
2011
Highly Cited
2011
Nonlinear random wave field in shallow water: variable Korteweg-de Vries framework
A. Sergeeva
,
E. Pelinovsky
,
T. Talipova
2011
Corpus ID: 54718058
Abstract. The transformation of a random wave field in shallow water of variable depth is analyzed within the framework of the…
Expand
Highly Cited
2009
Highly Cited
2009
On the extension of the freak wave warning system and its verification
2009
Corpus ID: 189858921
This memo discusses a number of updates to the freak wave warn ing system which were introduced in cycle 33R1 of the IFS. The…
Expand
Highly Cited
2007
Highly Cited
2007
A Case Study Approachto Understanding Regional Resilience
Kathryn Foster
2007
Corpus ID: 59151238
Working Paper 2007-08 MACARTHUR FOUNDATION RESEARCH NETWORK ON BUILDING RESILIENT REGIONS A Case Study Approach to Understanding…
Expand
Highly Cited
2005
Highly Cited
2005
Modulation instability of Stokes wave → freak wave
A. Dyachenko
,
V. Zakharov
2005
Corpus ID: 121424227
Formation of waves of large amplitude (freak waves, killer waves) at the surface of the ocean is studied numerically. We have…
Expand
2005
2005
Interpreting Rights Globally: Courts and Constitutional Rights in Emerging Democracies
N. Udombana
2005
Corpus ID: 142385638
Democracy has spread over Africa and with it new constitutions with justiciable bills of rights have been accepted. The main…
Expand
Highly Cited
2003
Highly Cited
2003
Freaks, gold diggers, divas, and dykes: The sociohistorical development of adolescent African American women’s sexual scripts
D. Stephens
,
Layli D. Phillips
2003
Corpus ID: 143036176
The development of a sexual self is based in an understanding of the messages and meanings an individual is given about sexual…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE