Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,386,821 papers from all fields of science
Search
Sign In
Create Free Account
mbed TLS
Known as:
Polar ssl
, PolarSSL
, XySSL
mbed TLS (previously PolarSSL) is an implementation of the TLS and SSL protocols and the respective cryptographic algorithms and support code…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Android
Application-Layer Protocol Negotiation
Buildbot
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Amélioration d'attaques par canaux auxiliaires sur la cryptographie asymétrique. (Improvement of side-channel attack on asymmetric cryptography)
Margaux Dugardin
2017
Corpus ID: 146807341
Depuis les annees 90, les attaques par canaux auxiliaires ont remis en cause le niveau de securite des algorithmes…
Expand
2017
2017
Practical Implementations of Quantum-Resistant Cryptography
J. Velázquez
2017
Corpus ID: 3680637
3 Incorporation of Quantum-safe Algorithms into OpenSSL 5 3.1 Quantum-safe Key Exchange Mechanism . . . . . . . . . . . . 6 3.2…
Expand
2016
2016
Tools for the Evaluation and Choice of Countermeasures against Side-Channel Attacks
Goran Doychev
2016
Corpus ID: 132341839
Side-channel attacks have been successful in breaking cryptographic protections of systems, by using secret-dependent variations…
Expand
2015
2015
Analysis of public-key encryption schemes in extended attack models
Dale L. Sibborn
2015
Corpus ID: 215862302
2012
2012
A Coq Starter Kit to Verify TLS Packet Processing in C ?
Reynald Affeldt
,
Kiyoshi Yamada
2012
Corpus ID: 18583113
TLS is such a widespread security protocol that errors in its implementation can have disastrous consequences. This heavy…
Expand
2012
2012
A MICROKERNEL BASED SECURE OPERATING SYSTEM USING GENODE FRAMEWORK
B. Pruthiviraj
,
G. S. Madhusuthun
,
S. Vijayasarathy
,
K. Chakrapani
,
M. Tech
2012
Corpus ID: 278369
In a period when financial transactions have become substantially online, it is important from both se curity and functional…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required