Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

OpenSSL

Known as: OpenSSL exception, CVE-2014-0224, BoringSSL 
In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
The scatter–gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper, we show… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2016
Highly Cited
2016
The scatter-gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper we show that… Expand
Is this relevant?
2016
2016
In this work, we give a lattice attack on the ECDSA implementation in the latest version of OpenSSL, which implement the scalar… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We have proved, with machine-checked proofs in Coq, that an OpenSSL implementation of HMAC with SHA- 256 correctly implements its… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2014
Highly Cited
2014
We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented using a function of the… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2013
2013
OpenSSL is the most widely used library for SSL/TLS on the Android platform. The security of OpenSSL depends greatly on the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SBPA) and Instruction Cache… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Most applications these days are at least somewhat network aware, but how do you protect those applications against common… Expand
Is this relevant?