Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

GnuTLS

Known as: GNU TLS 
GnuTLS (/ˈɡnuː ˌtiː ˌɛl ˈɛs/, the GNU Transport Layer Security Library) is a free software implementation of the TLS, SSL and DTLS protocols. It… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Today, about 10% of TLS connections are still using CBC-mode cipher suites, despite a long history of attacks and the… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
2017
2017
Elliptic Curve Cryptography (ECC) is a promising public key cryptography, probably takes the place of RSA. Not only ECC uses less… Expand
  • figure 2
Is this relevant?
2017
2017
Elliptic curve cryptography (ECC) in TLS, PGP and SSH, which are just three of the main technologies on which the modern web and… Expand
  • figure 1
Is this relevant?
2016
2016
Any information system using encryption tends to have its own key management infrastructure. In practice, we find a separate key… Expand
  • figure 1
  • figure 4
  • figure 3
  • figure 5
  • figure 7
Is this relevant?
2016
2016
Incorrect error handling in security-sensitive code often leads to severe security vulnerabilities. Implementing correct error… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We describe a largely automated and systematic analysis of TLS implementations by what we call 'protocol state fuzzing': we use… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications. Security of SSL connections against an… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The Datagram Transport Layer Security (DTLS) protocol provides confidentiality and integrity of data exchanged between a client… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
2008
2008
We give three variants and improvements of Bleichenbacher’s low-exponent attack from CRYPTO 2006 on PKCS#1 v1.5 RSA signatures… Expand
Is this relevant?
2004
2004
SSL/TLS is currently the most deployed security protocol on the Internet. SSL/TLS provides end-to-end secure communications… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 6
Is this relevant?