Examining the Encryption Threat

Peter Gutmann pgut001 at cs.auckland.ac.nz
Fri May 28 09:20:30 EDT 2004


"Peter Parker" <peterparker at fastmail.fm> writes:

>In one of the issue of ijde found at
>http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have analysed
>various encryption applications and discussed results for few sample
>applications. Does any one have the complete results. Tried mailing the
>author but no response. Any one having further info.

To save people downloading the PDF, it's an 11-page article that reinvents
the 'file' command.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list