Academic literature on the topic 'Cipher suites'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cipher suites.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cipher suites"
Lara, Evangelina, Leocundo Aguilar, Jesús García, and Mauricio Sanchez. "A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices." Sensors 18, no. 10 (2018): 3326. http://dx.doi.org/10.3390/s18103326.
Full textKolegov, D. N., and Y. R. Khalniyazova. "WireGuard protocol with gost cipher suites." Prikladnaya diskretnaya matematika. Prilozhenie, no. 14 (September 1, 2021): 81–84. http://dx.doi.org/10.17223/2226308x/14/18.
Full textFan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.
Full textSerrano, Ronaldo, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, and Trong-Thuc Hoang. "ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3." Cryptography 6, no. 2 (2022): 30. http://dx.doi.org/10.3390/cryptography6020030.
Full textMashael, Alsaleh, and Aldossary Abdullah. "Cryptographic Key Generation for Logically Shared Data Stores." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 58–59. https://doi.org/10.5281/zenodo.8185969.
Full textAlamer, Ahmed, Ben Soh, and David E. Brumbaugh. "MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT." Symmetry 12, no. 1 (2019): 32. http://dx.doi.org/10.3390/sym12010032.
Full textArunkumar, B., and G. Kousalya. "Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS." Computer Systems Science and Engineering 40, no. 1 (2022): 179–90. http://dx.doi.org/10.32604/csse.2022.018166.
Full textPeñarrieta, David, Marlon Navia, Eliana Garcia, and Dannyll Zambrano. "Evaluación de la Seguridad de Certificados Digitales en las Plataformas Financieras de Ecuador." Revista Tecnológica - ESPOL 36, no. 2 (2024): 174–89. https://doi.org/10.37815/rte.v36n2.1222.
Full textFadhli, Muhamad, Fityan Ali Munshi, and Taufik Adi Wicaksono. "Ancaman Keamanan pada Transport Layer Security." Jurnal ULTIMA Computing 7, no. 2 (2016): 70–75. http://dx.doi.org/10.31937/sk.v7i2.234.
Full textAnelia, Syifa Sabrina, Jayanta Jayanta, and Bayu Hananto. "Uji Penetrasi Server Universitas PQR Menggunakan Metode National Institute Of Standards And Technology (NIST SP 800-115)." Jurnal Ilmu Teknik dan Komputer 7, no. 1 (2023): 34. http://dx.doi.org/10.22441/jitkom.2023.v7i1.005.
Full textDissertations / Theses on the topic "Cipher suites"
Kjell, Edvin, and Sebastian Frisenfelt. "Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177184.
Full textScola, Carlo Alberto. "Valutazione della sicurezza delle comunicazioni con i principali istituti di credito online." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14741/.
Full textVignudelli, Andrea. "Filtraggio e censura dei servizi Internet Un'analisi sul protocollo SSL/TLS." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13204/.
Full textWidyopratomo, Daniel Adrianto, and 魏丹尼. "Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/93038423754970301425.
Full textBook chapters on the topic "Cipher suites"
Arunkumar, B., and G. Kousalya. "Analysis of AES-GCM Cipher Suites in TLS." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68385-0_9.
Full textMoura, Ricardo, David R. Matos, Miguel L. Pardal, and Miguel Correia. "MultiTLS: Secure Communication Channels with Cipher Suite Diversity." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2_5.
Full textPoupard, Guillaume, and Serge Vaudenay. "Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_24.
Full textPrinz, Stefan, Silvie Schmidt, Manuel Koschuch, Alexander Glaser, Taro Fruhwirth, and Matthias Hudler. "What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility." In E-Business and Telecommunications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30222-5_3.
Full textRenner, Sebastian, Enrico Pozzobon, and Jürgen Mottok. "A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers." In Information and Communications Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61078-4_28.
Full textShinde, Reena, and Bramah Hazela. "IoT Security Using Lightweight Cipher Suites in Constrained Application Protocols (CoAP)." In Lightweight Cryptographic Algorithms for Secure IoT Devices, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552302-14.
Full textSrinivas, Yallapu, and Akash Dey. "Design and Evaluation of Stream Ciphers in Battery Powered IoT Sensors." In Lightweight Cryptographic Algorithms for Secure IoT Devices, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552302-03.
Full textBryan, Simms. "Secret Programs with Twelve Tones, 1925–27." In Berg. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190931445.003.0008.
Full textBudiansky, Stephen. "Colossus, Codebreaking, and the Digital Age." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0011.
Full textSmith, Michael. "How It Began: Bletchley Park Goes to War." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0009.
Full textConference papers on the topic "Cipher suites"
Albrecht, Martin R., Jean Paul Degabriele, Torben Brandt Hansen, and Kenneth G. Paterson. "A Surfeit of SSH Cipher Suites." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2976749.2978364.
Full textSimos, Dimitris E., Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, and Raghu Kacker. "TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach." In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2016. http://dx.doi.org/10.1109/qrs.2016.18.
Full textKoschuch, Manuel, Taro Fruhwirth, Alexander Glaser, Silvie Schmidt, and Matthias Hudler. "Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility." In International Conference on Data Communication Networking. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005507900130023.
Full textGarcia, Daniel, and Hong Liu. "A Study of Post Quantum Cipher Suites for Key Exchange." In 2021 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, 2021. http://dx.doi.org/10.1109/hst53381.2021.9619839.
Full textAdrianto, Daniel, and Fuchun Joseph Lin. "Analysis of security protocols and corresponding cipher suites in ETSI M2M standards." In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389152.
Full textHeftrig, Elias, Jean-Pierre Seifert, Haya Shulman, Michael Waidner, and Nils Wisiol. "Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2021. http://dx.doi.org/10.1145/3460120.3485349.
Full textYesiltepe, Mirsat, Gulsah Kose, and Sinem Karadeniz. "Protocols of cipher suite." In 2016 Elektrik-Elektronik, Bilgisayer, Biyomedikal Muhendislikleri Bilimsel Toplantisi (EBBT) [2016 Electrical, Electronic, Computer and Biomedical Engineering Meeting (EBBT)]. IEEE, 2016. http://dx.doi.org/10.1109/ebbt.2016.7483684.
Full textNarayanan, Renuka, S. Jayashree, Nisha Deborah Philips, A. M. Saranya, Sahaya Beni Prathiba, and Gunasekaran Raja. "TLS Cipher Suite: Secure Communication of 6LoWPAN Devices." In 2019 11th International Conference on Advanced Computing (ICoAC). IEEE, 2019. http://dx.doi.org/10.1109/icoac48765.2019.246840.
Full textLee, Yoonyoung, Soonhaeng Hur, Dongho Won, and Seungjoo Kim. "Cipher Suite Setting Problem of SSL Protocol and it's Solutions." In 2009 International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2009. http://dx.doi.org/10.1109/waina.2009.76.
Full textFrost, Vanessa, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, and Kevin R. B. Butler. "Examining DES-based Cipher Suite Support within the TLS Ecosystem." In Asia CCS '19: ACM Asia Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3321705.3329858.
Full textReports on the topic "Cipher suites"
Popov, A. Prohibiting RC4 Cipher Suites. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7465.
Full textKato, A., M. Kanda, and S. Kanno. Camellia Cipher Suites for TLS. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5932.
Full textYang, P. ShangMi (SM) Cipher Suites for TLS 1.3. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8998.
Full textBadra, M., and I. Hajjeh. ECDHE_PSK Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5489.
Full textCam-Winget, N., and J. Visoky. TLS 1.3 Authentication and Integrity-Only Cipher Suites. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9150.
Full textLonvick, C., S. Turner, and J. Salowey. Updates to the Cipher Suites in Secure Syslog. RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9662.
Full textSalowey, J., A. Choudhury, and D. McGrew. AES Galois Counter Mode (GCM) Cipher Suites for TLS. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5288.
Full textMcGrew, D., and D. Bailey. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6655.
Full textLangley, A., W. Chang, N. Mavrogiannopoulos, J. Strombergson, and S. Josefsson. ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7905.
Full textMedvinsky, A., and M. Hur. Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2712.
Full text