Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

OpenSSL

Known as: OpenSSL exception, CVE-2014-0224, BoringSSL 
In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
The scatter–gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper, we show… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2016
Highly Cited
2016
The scatter-gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper we show that… Expand
Highly Cited
2015
Highly Cited
2015
We have proved, with machine-checked proofs in Coq, that an OpenSSL implementation of HMAC with SHA- 256 correctly implements its… Expand
  • figure 1
  • figure 2
Highly Cited
2014
Highly Cited
2014
We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented using a function of the… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Highly Cited
2013
Highly Cited
2013
OpenSSL is the most widely used library for SSL/TLS on the Android platform. The security of OpenSSL depends greatly on the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2011
Highly Cited
2011
We present a 64-bit optimized implementation of the NIST and SECG-standardized elliptic curve P-224. Our implementation is fully… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
Highly Cited
2011
Highly Cited
2011
The accurate and efficient treatment of mutable data structures is one of the outstanding problem areas in automatic program… Expand
  • table I
  • table II
  • figure 5
  • figure 6
Highly Cited
2008
Highly Cited
2008
MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SBPA) and Instruction Cache… Expand
  • table 1
  • table 2
Highly Cited
2007
Highly Cited
2007
Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2002
Highly Cited
2002
Most applications these days are at least somewhat network aware, but how do you protect those applications against common… Expand