Get Updates:   By RSS
Logo   

Foundations of Coding

Compression, Encryption, Error Correction

  • Overview
    • Description
    • Organization
    • Table of Content
    • Erratas
  • Ordering
  • Exercises
  • Blog/News
  • About
    • The Authors
    • Contacts
    • This site
  • RSS RSS

Blog Archive

2015

GHOST: buffer overflow in glibc

Jan 28th, 2015   glibc, overflow, security

Lavabit founder wants to make dark e-mail secure by default

Jan 9th, 2015   e-mail, security

Inside the NSA’s War on Internet Security

Jan 2nd, 2015   NSA, crypto, internet

2014

The POODLE Attack and the end of SSL 3.0

Oct 14th, 2014   SSL3, crypto

shellshock, bash exploit

Sep 26th, 2014   bash, ssh

German NSA committee may turn to typewriters

Jul 14th, 2014   typewriters

Stopping Cybercrime Can Positively Impact World Economies

Jun 9th, 2014   cybercrime

2013

Agreement for publishing our book

Sep 27th, 2013   book

Management of SSH keys

Jan 1st, 2013   SSH

2012

Keccak selected to become the new SHA3

Oct 2nd, 2012   SHA3, crypto, hash

Recent Posts
GHOST: Buffer Overflow in Glibc Lavabit Founder Wants to Make Dark E-mail Secure by Default Inside the NSA's War on Internet Security The POODLE Attack and the End of SSL 3.0 Shellshock, Bash Exploit

Copyright © 2015 - J-G. Dumas, J-L. Roch, E. Tannier and S. Varrette
Powered by Octopress, based on the octostrap3 theme customized by S. Varrette.