Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,180,270 papers from all fields of science
Search
Sign In
Create Free Account
OpenSSL
Known as:
OpenSSL exception
, CVE-2014-0224
, BoringSSL
Expand
In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application-Layer Protocol Negotiation
BeOS R5.1d0 "Dano/EXP"
Brute-force attack
Certificate authority
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA
Monjur Alam
,
Haider Adnan Khan
,
+4 authors
Milos Prvulović
USENIX Security Symposium
2018
Corpus ID: 51840365
This paper presents the first side channel attack approach that, without relying on the cache organization and/or timing…
Expand
Highly Cited
2017
Highly Cited
2017
Vale: Verifying High-Performance Cryptographic Assembly Code
Barry Bond
,
C. Hawblitzel
,
+6 authors
Laure Thompson
USENIX Security Symposium
2017
Corpus ID: 20976460
High-performance cryptographic code often relies on complex hand-tuned assembly language that is customized for individual…
Expand
2017
2017
AES-GCM-SIV: Specification and Analysis
S. Gueron
,
Adam Langley
,
Yehuda Lindell
IACR Cryptology ePrint Archive
2017
Corpus ID: 6625225
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined in the CFRG specification…
Expand
2017
2017
Healthcare and digital transformation
Eileen Haggerty
Network Security
2017
Corpus ID: 38035254
Highly Cited
2015
Highly Cited
2015
Verified Correctness and Security of OpenSSL HMAC
Lennart Beringer
,
Adam Petcher
,
Katherine Q. Ye
,
A. Appel
USENIX Security Symposium
2015
Corpus ID: 14140826
We have proved, with machine-checked proofs in Coq, that an OpenSSL implementation of HMAC with SHA- 256 correctly implements its…
Expand
Highly Cited
2014
Highly Cited
2014
Fine Grain Cross-VM Attacks on Xen and VMware
Gorka Irazoqui Apecechea
,
Mehmet Sinan Inci
,
T. Eisenbarth
,
B. Sunar
IEEE Fourth International Conference on Big Data…
2014
Corpus ID: 15356795
This work exposes vulnerabilities in virtualized cloud servers by mounting Cross-VM cache attacks in Xen and VMware VMs. We show…
Expand
2013
2013
A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
Alessandro Barenghi
,
G. Bertoni
,
L. Breveglieri
,
Gerardo Pelosi
Journal of Systems and Software
2013
Corpus ID: 23721613
Highly Cited
2012
Highly Cited
2012
SCAPI: The Secure Computation Application Programming Interface
Yael Ejgenberg
,
Moriya Farbstein
,
M. Levy
,
Yehuda Lindell
IACR Cryptology ePrint Archive
2012
Corpus ID: 9533835
Secure two-party and multiparty computation has long stood at the center of the foundations of theoretical cryptography. Recently…
Expand
Highly Cited
2008
Highly Cited
2008
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
T. Ristenpart
,
Gabriel Y. Maganis
,
A. Krishnamurthy
,
Tadayoshi Kohno
USENIX Security Symposium
2008
Corpus ID: 813983
We tackle the problem of building privacy-preserving device-tracking systems--or private methods to assist in the recovery of…
Expand
Highly Cited
2002
Highly Cited
2002
Network Security with OpenSSL
J. Viega
,
M. Messier
,
Pravir Chandra
2002
Corpus ID: 60734923
From the Publisher: Most applications these days are at least somewhat network aware, but how do you protect those applications…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required