August 2005 Archives by author
Starting: Mon Aug 1 01:40:21 EDT 2005
Ending: Wed Aug 31 18:58:33 EDT 2005
Messages: 245
- draft paper: "Deploying a New Hash Algorithm"
Alex Alten
- When people ask for security holes as features
Alex Alten
- Possibly new result on truncating hashes
Joseph Ashwood
- Another entry in the internet security hall of shame....
Derek Atkins
- locking door when window is open? (Re: solving the wrong problem)
Adam Back
- How many wrongs do you need to make a right?
Adam Back
- Another entry in the internet security hall of shame....
Adam Back
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Adam Back
- e2e & security by default (Re: e2e all the way)
Adam Back
- Standardization and renewability
Hagai Bar-El
- draft paper: "Deploying a New Hash Algorithm"
Steven M. Bellovin
- cracking passwords and challenge/response
Steven M. Bellovin
- solving the wrong problem
Steven M. Bellovin
- faster SHA-1 attacks?
Steven M. Bellovin
- How many wrongs do you need to make a right?
Steven M. Bellovin
- How many wrongs do you need to make a right?
Steven M. Bellovin
- online MD5 crack database
Steven M. Bellovin
- Another entry in the internet security hall of shame....
Steven M. Bellovin
- Another entry in the internet security hall of shame....
Steven M. Bellovin
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Steven M. Bellovin
- MD5 Collision, Visualised
Steven M. Bellovin
- Webcast of crypto rump session this year!
Matt Blaze
- solving the wrong problem
Daniel Carosone
- Ostiary
Karl Chen
- Query about hash function capability
Ian Clelland
- Another entry in the internet security hall of shame....
Gilles DEMARTY
- Another entry in the internet security hall of shame....
Alaric Dailey
- Another entry in the internet security hall of shame....
Alaric Dailey
- solving the wrong problem
Hadmut Danisch
- solving the wrong problem
Sherri Davidoff
- Query about hash function capability
Dean, James
- solving the wrong problem
John Denker
- solving the wrong problem
John Denker
- Number of rounds needed for perfect Feistel?
Tim Dierks
- Number of rounds needed for perfect Feistel?
Tim Dierks
- Another entry in the internet security hall of shame....
Tim Dierks
- no visas for Chinese cryptologists
Hasan Diwan
- Cross logins
James A. Donald
- Cross logins
James A. Donald
- [Clips] The summer of PKI love
James A. Donald
- The summer of PKI love
James A. Donald
- Another entry in the internet security hall of shame....
James A. Donald
- Another entry in the internet security hall of shame....
James A. Donald
- Another entry in the internet security hall of shame....
James A. Donald
- Last WWII Comanche "code talker" dies in Oklahoma
Victor Duchovni
- Cross logins
Victor Duchovni
- Query about hash function capability
Victor Duchovni
- [Clips] Does Phil Zimmermann need a clue on VoIP?
Victor Duchovni
- Motorist wins case after maths whizzes break speed camera code
Victor Duchovni
- online MD5 crack database
Victor Duchovni
- Another entry in the internet security hall of shame....
Victor Duchovni
- [Clips] Does Phil Zimmermann need a clue on VoIP?
Mark Allen Earnest
- The summer of PKI love
Mark Allen Earnest
- solving the wrong problem
Peter Fairbrother
- solving the wrong problem
Peter Fairbrother
- spyware targets bank customers. news at 11.
Adam Fields
- NY Times article on biometrics and border control
Adam Fields
- Possibly new result on truncating hashes
Hal Finney
- Possibly new result on truncating hashes
Hal Finney
- Number of rounds needed for perfect Feistel?
Hal Finney
- Fwd: Tor security advisory: DH handshake flaw
Hal Finney
- Fwd: Tor security advisory: DH handshake flaw
Hal Finney
- Fwd: Tor security advisory: DH handshake flaw
Hal Finney
- Last WWII Comanche "code talker" dies in Oklahoma
Daniel F. Fisher
- [Clips] Escaping Password Purgatory
Bill Frantz
- Possible non-extension property for hash functions
Bill Frantz
- Cross logins
Steve Furlong
- draft paper: "Deploying a New Hash Algorithm"
Steve Furlong
- online MD5 crack database
Steve Furlong
- Another entry in the internet security hall of shame....
Steve Furlong
- The summer of PKI love
Ian G
- ID "theft" -- so what?
Ian G
- Another entry in the internet security hall of shame....
Ian G
- Another entry in the internet security hall of shame....
Ian G
- Another entry in the internet security hall of shame....
Ian G
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Ian G
- Another entry in the internet security hall of shame....
Ian G
- Another entry in the internet security hall of shame....
Ian G
- Another entry in the internet security hall of shame....
Ian G
- instant lottery cards too, Re: reading PINs in "secure" mailers without opening them
Ed Gerck
- Ostiary
Ian Grigg
- [Clips] Escaping Password Purgatory
Ian Grigg
- solving the wrong problem
Peter Gutmann
- solving the wrong problem
Peter Gutmann
- solving the wrong problem
Peter Gutmann
- How much for a DoD X.509 certificate?
Peter Gutmann
- The summer of PKI love
Peter Gutmann
- How many wrongs do you need to make a right?
Peter Gutmann
- How many wrongs do you need to make a right?
Peter Gutmann
- When people ask for security holes as features
Peter Gutmann
- Another entry in the internet security hall of shame....
Peter Gutmann
- Another entry in the internet security hall of shame....
Peter Gutmann
- Another entry in the internet security hall of shame....
Peter Gutmann
- Last WWII Comanche "code talker" dies in Oklahoma
Andreas Hasenack
- How many wrongs do you need to make a right?
Andreas Hasenack
- Please try TrustBar 0.4 beta 9.3 with Hey! ...
Amir Herzberg
- [Clips] Hackers Hit Microsoft Windows Genuine Advantage
R.A. Hettinga
- [Clips] "Clippre": Leaving a trail of tech
R.A. Hettinga
- [Clips] Online ID Thieves Exploit Lax ATM Security
R.A. Hettinga
- [fc-announce] CFP FC'06: Financial Cryptography and Data Security
R.A. Hettinga
- [Clips] Apple adopts controversial security chip
R.A. Hettinga
- [Clips] Escaping Password Purgatory
R.A. Hettinga
- [Clips] At Online Stores, Sniffing Out Crooks Is a Matter of Survival
R.A. Hettinga
- [Clips] How to Exit the Matrix
R.A. Hettinga
- [Clips] Does Phil Zimmermann need a clue on VoIP?
R.A. Hettinga
- [Clips] Phil Zimmermann defends his VoIP crypto
R.A. Hettinga
- [Clips] Knowing me, knowing you
R.A. Hettinga
- [Clips] The summer of PKI love
R.A. Hettinga
- [Clips] Peppercoin Secures $8 Million in Venture Funding
R.A. Hettinga
- [Clips] [MTNews] CRYPTO-Server 6.3
R.A. Hettinga
- [Clips] RSA Security Sees Hope in Online Fraud
R.A. Hettinga
- Another entry in the internet security hall of shame....
R.A. Hettinga
- Query about hash function capability
Jason Holt
- solving the wrong problem
Dave Howe
- Another entry in the internet security hall of shame....
Dave Howe
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Dave Howe
- Another entry in the internet security hall of shame....
Dave Howe
- Another entry in the internet security hall of shame....
Dave Howe
- Another entry in the internet security hall of shame....
Dave Howe
- webcast of crypto rumpsession this year?
James Hughes
- Fwd: Tor security advisory: DH handshake flaw
Simon Josefsson
- Fwd: Tor security advisory: DH handshake flaw
Simon Josefsson
- Fwd: Tor security advisory: DH handshake flaw
Simon Josefsson
- MD5 Collision, Visualised
Dan Kaminsky
- NY Times article on biometrics and border control
Stefan Kelm
- [Clips] The summer of PKI love
Stefan Kelm
- The summer of PKI love
Stefan Kelm
- draft paper: "Deploying a New Hash Algorithm"
John Kelsey
- solving the wrong problem
John Kelsey
- Possible non-extension property for hash functions
John Kelsey
- How much for a DoD X.509 certificate?
John Kelsey
- herding attack paper submitted to ePrint archive
John Kelsey
- Another entry in the internet security hall of shame....
John Kelsey
- Ostiary
Alexander Klimov
- Query about hash function capability
Alexander Klimov
- Number of rounds needed for perfect Feistel?
Alexander Klimov
- How many wrongs do you need to make a right?
Alexander Klimov
- Fwd: Tor security advisory: DH handshake flaw
Werner Koch
- AW: Possibly new result on truncating hashes
Kuehn, Ulrich
- Another entry in the internet security hall of shame....
Chris Kuethe
- ID "theft" -- so what?
Ben Laurie
- The summer of PKI love
Ben Laurie
- Possible non-extension property for hash functions
Ben Laurie
- How many wrongs do you need to make a right?
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- MD5 Collision, Visualised
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- MD5 Collision, Visualised
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- MD5 Visualised, Mark II
Ben Laurie
- [Clips] Escaping Password Purgatory
Jerrold Leichter
- Query about hash function capability
Jerrold Leichter
- solving the wrong problem
Ilya Levin
- solving the wrong problem
Ilya Levin
- Motorist wins case after maths whizzes break speed camera code
Sidney Markowitz
- solving the wrong problem
Perry E. Metzger
- solving the wrong problem
Perry E. Metzger
- spyware targets bank customers. news at 11.
Perry E. Metzger
- NY Times article on biometrics and border control
Perry E. Metzger
- faster SHA-1 attacks?
Perry E. Metzger
- online MD5 crack database
Perry E. Metzger
- Another entry in the internet security hall of shame....
Perry E. Metzger
- reading PINs in "secure" mailers without opening them
Perry E. Metzger
- Another entry in the internet security hall of shame....
Enzo Michelangeli
- Standardization and renewability
Thierry Moreau
- Cross logins
RL 'Bob' Morgan
- Last WWII Comanche "code talker" dies in Oklahoma
Udhay Shankar N
- Ostiary
Udhay Shankar N
- Last WWII Comanche "code talker" dies in Oklahoma
Udhay Shankar N
- no visas for Chinese cryptologists
Udhay Shankar N
- The Devil's Infosec Dictionary
Udhay Shankar N
- solving the wrong problem
Russell Nelson
- The summer of PKI love
Stephan Neuhaus
- Another entry in the internet security hall of shame....
Stephan Neuhaus
- Another entry in the internet security hall of shame....
Nick Owen
- Fwd: Tor security advisory: DH handshake flaw
Chris Palmer
- Query about hash function capability
Arash Partow
- Motorist wins case after maths whizzes break speed camera code
Aram Perez
- Ostiary
Nicolas Rachinsky
- Two results on SHA-256 in progress
Mads Rasmussen
- webcast of crypto rumpsession this year?
Mads Rasmussen
- faster SHA-1 attacks?
Mads Rasmussen
- Another entry in the internet security hall of shame....
Eric Rescorla
- Another entry in the internet security hall of shame....
Eric Rescorla
- Another entry in the internet security hall of shame....
Eric Rescorla
- Number of rounds needed for perfect Feistel?
Greg Rose
- Cross logins
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Peter Saint-Andre
- Cross logins
Rich Salz
- How much for a DoD X.509 certificate?
John Saylor
- solving the wrong problem
Adam Shostack
- Another entry in the internet security hall of shame....
Roy M. Silvernail
- solving the wrong problem
J.A. Terranson
- Another entry in the internet security hall of shame....
Trei, Peter
- Cross logins
Florian Weimer
- spyware targets bank customers. news at 11.
Florian Weimer
- spyware targets bank customers. news at 11.
Florian Weimer
- How many wrongs do you need to make a right?
Florian Weimer
- no visas for Chinese cryptologists
Florian Weimer
- How many wrongs do you need to make a right?
Florian Weimer
- draft paper: "Deploying a New Hash Algorithm"
Florian Weimer
- [Clips] RSA Security Sees Hope in Online Fraud
Florian Weimer
- [Clips] Online ID Thieves Exploit Lax ATM Security
Anne & Lynn Wheeler
- [Clips] Escaping Password Purgatory
Anne & Lynn Wheeler
- Cross logins
Anne & Lynn Wheeler
- [Clips] Does Phil Zimmermann need a clue on VoIP?
Anne & Lynn Wheeler
- [Clips] Does Phil Zimmermann need a clue on VoIP?
Anne & Lynn Wheeler
- solving the wrong problem
Anne & Lynn Wheeler
- solving the wrong problem
Anne & Lynn Wheeler
- The summer of PKI love
Anne & Lynn Wheeler
- How much for a DoD X.509 certificate?
Anne & Lynn Wheeler
- How much for a DoD X.509 certificate?
Anne & Lynn Wheeler
- The summer of PKI love
Anne & Lynn Wheeler
- How many wrongs do you need to make a right?
Anne & Lynn Wheeler
- How many wrongs do you need to make a right?
Anne & Lynn Wheeler
- Another entry in the internet security hall of shame....
Anne & Lynn Wheeler
- Federal Information Assurance Conference 2005, Oct 25-26
Anne & Lynn Wheeler
- Another entry in the internet security hall of shame....
Anne & Lynn Wheeler
- Another entry in the internet security hall of shame....
Anne & Lynn Wheeler
- Another entry in the internet security hall of shame....
Aaron Whitehouse
- CORRECTION / RE: Qualified Certificate Request
Nap van Zuuren
- Motorist wins case after maths whizzes break speed camera code
brucee at chunder.com
- [Clips] Does Phil Zimmermann need a clue on VoIP?
dan at geer.org
- knotty problems
dan at geer.org
- online MD5 crack database
dan at geer.org
- online MD5 crack database
dan at geer.org
- Webcast of crypto rump session this year!
james hughes
- Webcast of crypto rump session this year!
james hughes
- Another entry in the internet security hall of shame....
james hughes
- Standardization and renewability
astiglic at okiok.com
- solving the wrong problem
astiglic at okiok.com
- Fwd: Tor security advisory: DH handshake flaw
astiglic at okiok.com
- Fwd: Tor security advisory: DH handshake flaw
astiglic at okiok.com
- Fwd: Tor security advisory: DH handshake flaw
astiglic at okiok.com
- Fwd: Tor security advisory: DH handshake flaw
astiglic at okiok.com
Last message date:
Wed Aug 31 18:58:33 EDT 2005
Archived on: Sun Aug 7 18:24:37 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).