OpenSSL

Known as: OpenSSL exception, CVE-2014-0224, BoringSSL 
In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1997-2017
0204019972017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The scatter–gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper, we show… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2015
2015
We have proved, with machine-checked proofs in Coq, that an OpenSSL implementation of HMAC with SHA256 correctly implements its… (More)
  • figure 1
  • figure 2
Is this relevant?
2014
2014
We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented using a function of the… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2014
2014
OpenSSL must die, for it will never get any better. 
Is this relevant?
2011
2011
We present a 64-bit optimized implementation of the NIST and SECG-standardized elliptic curve P-224. Our implementation is fully… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
Is this relevant?
2008
2008
MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SBPA) and Instruction Cache… (More)
  • table 1
  • table 2
Is this relevant?
2007
2007
Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
This paper presents a version of the 2k-ary modular exponentiation algorithm that is secure against current methods of side… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2002
2002
network security with openssl cryptography for secure communications. Book lovers, when you need a new book to read, find the… (More)
Is this relevant?