Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,090 papers from all fields of science
Search
Sign In
Create Free Account
mbed TLS
Known as:
Polar ssl
, PolarSSL
, XySSL
mbed TLS (previously PolarSSL) is an implementation of the TLS and SSL protocols and the respective cryptographic algorithms and support code…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Android
Application-Layer Protocol Negotiation
Buildbot
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Amélioration d'attaques par canaux auxiliaires sur la cryptographie asymétrique. (Improvement of side-channel attack on asymmetric cryptography)
Margaux Dugardin
2017
Corpus ID: 146807341
Depuis les annees 90, les attaques par canaux auxiliaires ont remis en cause le niveau de securite des algorithmes…
Expand
2017
2017
Practical Implementations of Quantum-Resistant Cryptography
J. Velázquez
2017
Corpus ID: 3680637
3 Incorporation of Quantum-safe Algorithms into OpenSSL 5 3.1 Quantum-safe Key Exchange Mechanism . . . . . . . . . . . . 6 3.2…
Expand
2016
2016
Template attacks using classification algorithms
Elif Ozgen
,
L. Papachristodoulou
,
L. Batina
IEEE International Symposium on Hardware Oriented…
2016
Corpus ID: 3046333
Template attacks constitute a powerful side-channel attack technique that is shown to be efficient in breaking many secure…
Expand
2016
2016
Towards Efficient Application of Cryptographic Schemes on Constrained Microcontrollers
L. Malina
,
J. Hajny
,
P. Mlynek
,
Jiri Machacek
,
Radomir Svoboda
J. Circuits Syst. Comput.
2016
Corpus ID: 27977526
This work deals with the application of cryptographic schemes and primitives on the computational and memory-restricted…
Expand
2016
2016
Tools for the Evaluation and Choice of Countermeasures against Side-Channel Attacks
Goran Doychev
2016
Corpus ID: 132341839
Side-channel attacks have been successful in breaking cryptographic protections of systems, by using secret-dependent variations…
Expand
2016
2016
Formally verified countermeasures against cache based attacks in virtualization platforms
J. Campo
2016
Corpus ID: 63341727
Cache based attacks are a class of side-channel attacks that are particularly effective in virtualized or cloud-based…
Expand
2014
2014
An Intrinsic Encoding of a Subset of C and its Application to TLS Network Packet Processing
Reynald Affeldt
,
Kazuhiko Sakaguchi
Journal of Formalized Reasoning
2014
Corpus ID: 55568245
TLS is such a widespread security protocol that errors in its implementation can have disastrous consequences. This…
Expand
2012
2012
A MICROKERNEL BASED SECURE OPERATING SYSTEM USING GENODE FRAMEWORK
B. Pruthiviraj
,
G. S. Madhusuthun
,
S. Vijayasarathy
,
K. Chakrapani
,
M. Tech
2012
Corpus ID: 278369
In a period when financial transactions have become substantially online, it is important from both se curity and functional…
Expand
2012
2012
A Coq Starter Kit to Verify TLS Packet Processing in C ?
Reynald Affeldt
,
Kiyoshi Yamada
2012
Corpus ID: 18583113
TLS is such a widespread security protocol that errors in its implementation can have disastrous consequences. This heavy…
Expand
2009
2009
<formula formulatype="inline"><tex Notation="TeX">$f_{T}$</tex></formula> and <formula formulatype="inline"><tex Notation="TeX">$f_{\rm MAX}$</tex></formula> of 47 and 81 <emphasis emphasistype…
Nidhi
,
S. Dasgupta
,
+5 authors
U. Mishra
IEEE Electron Device Letters
2009
Corpus ID: 98442913
In this letter, we demonstrate the record small-signal performance from N-polar GaN-based metal-insulator-semiconductor high…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE