Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,782,783 papers from all fields of science
Search
Sign In
Create Free Account
mbed TLS
Known as:
Polar ssl
, PolarSSL
, XySSL
mbed TLS (previously PolarSSL) is an implementation of the TLS and SSL protocols and the respective cryptographic algorithms and support code…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Android
Application-Layer Protocol Negotiation
Buildbot
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Practical Implementations of Quantum-Resistant Cryptography
J. Velázquez
2017
Corpus ID: 3680637
3 Incorporation of Quantum-safe Algorithms into OpenSSL 5 3.1 Quantum-safe Key Exchange Mechanism . . . . . . . . . . . . 6 3.2…
Expand
2017
2017
Amélioration d'attaques par canaux auxiliaires sur la cryptographie asymétrique. (Improvement of side-channel attack on asymmetric cryptography)
Margaux Dugardin
2017
Corpus ID: 146807341
Depuis les annees 90, les attaques par canaux auxiliaires ont remis en cause le niveau de securite des algorithmes…
Expand
2016
2016
Towards Efficient Application of Cryptographic Schemes on Constrained Microcontrollers
L. Malina
,
J. Hajny
,
P. Mlynek
,
Jiri Machacek
,
Radomir Svoboda
J. Circuits Syst. Comput.
2016
Corpus ID: 27977526
This work deals with the application of cryptographic schemes and primitives on the computational and memory-restricted…
Expand
2016
2016
Tools for the Evaluation and Choice of Countermeasures against Side-Channel Attacks
Goran Doychev
2016
Corpus ID: 132341839
Side-channel attacks have been successful in breaking cryptographic protections of systems, by using secret-dependent variations…
Expand
2016
2016
Cold Boot Attack Methods for the Discrete Logarithm Problem
Hwei-Ming Ying
,
N. Kunihiro
International Symposium on Computing and…
2016
Corpus ID: 14957366
This paper proposes improvements to existing cold boot attack algorithms which greatly reduce the number of correlate tests…
Expand
2015
2015
Analysis of public-key encryption schemes in extended attack models
Dale L. Sibborn
2015
Corpus ID: 215862302
2014
2014
An Intrinsic Encoding of a Subset of C and its Application to TLS Network Packet Processing
Reynald Affeldt
,
Kazuhiko Sakaguchi
Journal of Formalized Reasoning
2014
Corpus ID: 55568245
TLS is such a widespread security protocol that errors in its implementation can have disastrous consequences. This…
Expand
2012
2012
A MICROKERNEL BASED SECURE OPERATING SYSTEM USING GENODE FRAMEWORK
B. Pruthiviraj
,
G. S. Madhusuthun
,
S. Vijayasarathy
,
K. Chakrapani
,
M. Tech
2012
Corpus ID: 278369
In a period when financial transactions have become substantially online, it is important from both se curity and functional…
Expand
2012
2012
A Coq Starter Kit to Verify TLS Packet Processing in C ?
Reynald Affeldt
,
Kiyoshi Yamada
2012
Corpus ID: 18583113
TLS is such a widespread security protocol that errors in its implementation can have disastrous consequences. This heavy…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE