Examining the Encryption Threat
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Fri May 28 09:20:30 EDT 2004
"Peter Parker" <peterparker at fastmail.fm> writes:
>In one of the issue of ijde found at
>http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have analysed
>various encryption applications and discussed results for few sample
>applications. Does any one have the complete results. Tried mailing the
>author but no response. Any one having further info.
To save people downloading the PDF, it's an 11-page article that reinvents
the 'file' command.
Peter.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list