Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Guinet, Adrien"'
Autor:
Aguilar-Melchor, Carlos, Bailleux, Thomas, Goertzen, Jason, Guinet, Adrien, Joseph, David, Stebila, Douglas
We show how to establish TLS connections using one less round trip. In our approach, which we call TurboTLS, the initial client-to-server and server-to-client flows of the TLS handshake are sent over UDP rather than TCP. At the same time, in the same
Externí odkaz:
http://arxiv.org/abs/2302.05311
Autor:
GUINET, Adrien
Publikováno v:
MISC; 2024 Hors-Serie 30, p78-89, 12p, 2 Color Photographs
Autor:
Guelton, Serge, Guinet, Adrien, Brunet, Pierrick, Martinez, Juan Manuel, Dagnat, Fabien, Szlifierski, Nicolas
Publikováno v:
Proceedings 18th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)
18th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)
18th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), Sep 2018, Madrid, Spain. pp.24-33, ⟨10.1109/SCAM.2018.00010⟩
18th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)
18th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), Sep 2018, Madrid, Spain. pp.24-33, ⟨10.1109/SCAM.2018.00010⟩
International audience; Code obfuscation is the de facto standard to protect intellectual property when delivering code in an unmanaged environment. It relies on additive layers of code tangling techniques, white-box encryption calls and platform-spe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::9e68d23c5d5043a465c7d20551ecc6d8
https://hal.science/hal-02062166
https://hal.science/hal-02062166
Publikováno v:
GreHack 2016
GreHack 2016, Nov 2016, Grenoble, France
GreHack 2016, Nov 2016, Grenoble, France
International audience; This article presents arybo (available at https://github.com/quarkslab/arybo) a tool that gives a bit-level symbolic representation of expressions involving various types of operators on bit strings. Such a tool can be used to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b132f32f41c6efa5cfa43086e4b16e19
https://hal.archives-ouvertes.fr/hal-01390528/document
https://hal.archives-ouvertes.fr/hal-01390528/document
Autor:
Guelton, Serge, Guinet, Adrien
Publikováno v:
MISC : Multi-system & Internet Security Cookbook
MISC : Multi-system & Internet Security Cookbook, 2013, pp.27-46
MISC : Multi-system & Internet Security Cookbook, 2013, pp.27-46
International audience; Depuis quelques années, la création d'applications performantes et capables de tirer partie de la capacité de calcul de une à plusieurs (milliers de) machines, traitant et créant des quantités d'information de plus en pl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6df001f8ebd18b28362baf1a7d807dba
https://hal.archives-ouvertes.fr/hal-02134760
https://hal.archives-ouvertes.fr/hal-02134760
Autor:
Aguilar-Melchor, Carlos, Barrier, Joris, Guelton, Serge, Guinet, Adrien, Killijian, Marc-Olivier, Lepoint, Tancrède
Publikováno v:
Topics in Cryptology - CT-RSA 2016; 2016, p341-356, 16p