August 2005 Archives by date
Starting: Mon Aug 1 01:40:21 EDT 2005
Ending: Wed Aug 31 18:58:33 EDT 2005
Messages: 245
- Last WWII Comanche "code talker" dies in Oklahoma
Udhay Shankar N
- CORRECTION / RE: Qualified Certificate Request
Nap van Zuuren
- Possibly new result on truncating hashes
Hal Finney
- Last WWII Comanche "code talker" dies in Oklahoma
Andreas Hasenack
- [Clips] Hackers Hit Microsoft Windows Genuine Advantage
R.A. Hettinga
- [Clips] "Clippre": Leaving a trail of tech
R.A. Hettinga
- Possibly new result on truncating hashes
Joseph Ashwood
- AW: Possibly new result on truncating hashes
Kuehn, Ulrich
- Ostiary
Udhay Shankar N
- [Clips] Online ID Thieves Exploit Lax ATM Security
R.A. Hettinga
- Last WWII Comanche "code talker" dies in Oklahoma
Udhay Shankar N
- Ostiary
Ian Grigg
- Last WWII Comanche "code talker" dies in Oklahoma
Victor Duchovni
- Possibly new result on truncating hashes
Hal Finney
- Ostiary
Karl Chen
- Ostiary
Nicolas Rachinsky
- [fc-announce] CFP FC'06: Financial Cryptography and Data Security
R.A. Hettinga
- Ostiary
Alexander Klimov
- Last WWII Comanche "code talker" dies in Oklahoma
Daniel F. Fisher
- Standardization and renewability
Hagai Bar-El
- [Clips] Online ID Thieves Exploit Lax ATM Security
Anne & Lynn Wheeler
- [Clips] Apple adopts controversial security chip
R.A. Hettinga
- [Clips] Escaping Password Purgatory
R.A. Hettinga
- Cross logins
James A. Donald
- Cross logins
Victor Duchovni
- Cross logins
Rich Salz
- Query about hash function capability
Arash Partow
- [Clips] Escaping Password Purgatory
Bill Frantz
- draft paper: "Deploying a New Hash Algorithm"
Alex Alten
- Cross logins
RL 'Bob' Morgan
- Standardization and renewability
astiglic at okiok.com
- Cross logins
Steve Furlong
- [Clips] At Online Stores, Sniffing Out Crooks Is a Matter of Survival
R.A. Hettinga
- Cross logins
Florian Weimer
- [Clips] Escaping Password Purgatory
Ian Grigg
- Query about hash function capability
Victor Duchovni
- Query about hash function capability
Dean, James
- Query about hash function capability
Alexander Klimov
- draft paper: "Deploying a New Hash Algorithm"
Steve Furlong
- Standardization and renewability
Thierry Moreau
- Cross logins
Peter Saint-Andre
- Query about hash function capability
Ian Clelland
- [Clips] How to Exit the Matrix
R.A. Hettinga
- Query about hash function capability
Jason Holt
- [Clips] Escaping Password Purgatory
Jerrold Leichter
- Query about hash function capability
Jerrold Leichter
- Cross logins
James A. Donald
- draft paper: "Deploying a New Hash Algorithm"
Steven M. Bellovin
- [Clips] Does Phil Zimmermann need a clue on VoIP?
R.A. Hettinga
- [Clips] Phil Zimmermann defends his VoIP crypto
R.A. Hettinga
- [Clips] Knowing me, knowing you
R.A. Hettinga
- [Clips] Escaping Password Purgatory
Anne & Lynn Wheeler
- Cross logins
Anne & Lynn Wheeler
- [Clips] Does Phil Zimmermann need a clue on VoIP?
Victor Duchovni
- [Clips] Does Phil Zimmermann need a clue on VoIP?
dan at geer.org
- [Clips] Does Phil Zimmermann need a clue on VoIP?
Mark Allen Earnest
- [Clips] Does Phil Zimmermann need a clue on VoIP?
Anne & Lynn Wheeler
- solving the wrong problem
Perry E. Metzger
- draft paper: "Deploying a New Hash Algorithm"
John Kelsey
- solving the wrong problem
John Denker
- solving the wrong problem
John Kelsey
- cracking passwords and challenge/response
Steven M. Bellovin
- solving the wrong problem
Steven M. Bellovin
- [Clips] Does Phil Zimmermann need a clue on VoIP?
Anne & Lynn Wheeler
- solving the wrong problem
Perry E. Metzger
- Possible non-extension property for hash functions
Bill Frantz
- solving the wrong problem
Sherri Davidoff
- solving the wrong problem
Anne & Lynn Wheeler
- solving the wrong problem
Hadmut Danisch
- solving the wrong problem
J.A. Terranson
- solving the wrong problem
Ilya Levin
- solving the wrong problem
Dave Howe
- solving the wrong problem
Adam Shostack
- solving the wrong problem
Peter Fairbrother
- solving the wrong problem
John Denker
- solving the wrong problem
Peter Gutmann
- solving the wrong problem
Peter Gutmann
- Possible non-extension property for hash functions
John Kelsey
- locking door when window is open? (Re: solving the wrong problem)
Adam Back
- solving the wrong problem
Peter Fairbrother
- solving the wrong problem
Russell Nelson
- solving the wrong problem
Daniel Carosone
- solving the wrong problem
Peter Gutmann
- Two results on SHA-256 in progress
Mads Rasmussen
- Please try TrustBar 0.4 beta 9.3 with Hey! ...
Amir Herzberg
- solving the wrong problem
Ilya Levin
- solving the wrong problem
Anne & Lynn Wheeler
- spyware targets bank customers. news at 11.
Perry E. Metzger
- spyware targets bank customers. news at 11.
Florian Weimer
- solving the wrong problem
astiglic at okiok.com
- spyware targets bank customers. news at 11.
Adam Fields
- NY Times article on biometrics and border control
Perry E. Metzger
- NY Times article on biometrics and border control
Adam Fields
- spyware targets bank customers. news at 11.
Florian Weimer
- Motorist wins case after maths whizzes break speed camera code
brucee at chunder.com
- The summer of PKI love
Anne & Lynn Wheeler
- Motorist wins case after maths whizzes break speed camera code
Victor Duchovni
- NY Times article on biometrics and border control
Stefan Kelm
- How much for a DoD X.509 certificate?
Peter Gutmann
- How much for a DoD X.509 certificate?
Anne & Lynn Wheeler
- [Clips] The summer of PKI love
R.A. Hettinga
- Motorist wins case after maths whizzes break speed camera code
Aram Perez
- How much for a DoD X.509 certificate?
John Kelsey
- Motorist wins case after maths whizzes break speed camera code
Sidney Markowitz
- The summer of PKI love
Stephan Neuhaus
- [Clips] The summer of PKI love
Stefan Kelm
- webcast of crypto rumpsession this year?
Mads Rasmussen
- How much for a DoD X.509 certificate?
John Saylor
- Number of rounds needed for perfect Feistel?
Tim Dierks
- How much for a DoD X.509 certificate?
Anne & Lynn Wheeler
- [Clips] The summer of PKI love
James A. Donald
- The summer of PKI love
James A. Donald
- The summer of PKI love
Mark Allen Earnest
- webcast of crypto rumpsession this year?
James Hughes
- Number of rounds needed for perfect Feistel?
Hal Finney
- Number of rounds needed for perfect Feistel?
Tim Dierks
- Number of rounds needed for perfect Feistel?
Alexander Klimov
- knotty problems
dan at geer.org
- Number of rounds needed for perfect Feistel?
Greg Rose
- The summer of PKI love
Anne & Lynn Wheeler
- The summer of PKI love
Peter Gutmann
- The summer of PKI love
Ian G
- ID "theft" -- so what?
Ben Laurie
- The summer of PKI love
Ben Laurie
- Possible non-extension property for hash functions
Ben Laurie
- ID "theft" -- so what?
Ian G
- Webcast of crypto rump session this year!
james hughes
- The summer of PKI love
Stefan Kelm
- Webcast of crypto rump session this year!
james hughes
- Webcast of crypto rump session this year!
Matt Blaze
- no visas for Chinese cryptologists
Udhay Shankar N
- How many wrongs do you need to make a right?
Peter Gutmann
- How many wrongs do you need to make a right?
Florian Weimer
- no visas for Chinese cryptologists
Florian Weimer
- faster SHA-1 attacks?
Perry E. Metzger
- faster SHA-1 attacks?
Steven M. Bellovin
- How many wrongs do you need to make a right?
Steven M. Bellovin
- How many wrongs do you need to make a right?
Florian Weimer
- How many wrongs do you need to make a right?
Ben Laurie
- How many wrongs do you need to make a right?
Adam Back
- draft paper: "Deploying a New Hash Algorithm"
Florian Weimer
- How many wrongs do you need to make a right?
Alexander Klimov
- How many wrongs do you need to make a right?
Peter Gutmann
- How many wrongs do you need to make a right?
Anne & Lynn Wheeler
- How many wrongs do you need to make a right?
Steven M. Bellovin
- faster SHA-1 attacks?
Mads Rasmussen
- How many wrongs do you need to make a right?
Anne & Lynn Wheeler
- no visas for Chinese cryptologists
Hasan Diwan
- [Clips] Peppercoin Secures $8 Million in Venture Funding
R.A. Hettinga
- How many wrongs do you need to make a right?
Andreas Hasenack
- When people ask for security holes as features
Peter Gutmann
- Fwd: Tor security advisory: DH handshake flaw
Chris Palmer
- When people ask for security holes as features
Alex Alten
- Fwd: Tor security advisory: DH handshake flaw
Hal Finney
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Hal Finney
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- online MD5 crack database
Perry E. Metzger
- online MD5 crack database
dan at geer.org
- online MD5 crack database
Steven M. Bellovin
- online MD5 crack database
Victor Duchovni
- online MD5 crack database
Steve Furlong
- online MD5 crack database
dan at geer.org
- [Clips] [MTNews] CRYPTO-Server 6.3
R.A. Hettinga
- herding attack paper submitted to ePrint archive
John Kelsey
- Fwd: Tor security advisory: DH handshake flaw
Hal Finney
- The Devil's Infosec Dictionary
Udhay Shankar N
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- [Clips] RSA Security Sees Hope in Online Fraud
R.A. Hettinga
- Another entry in the internet security hall of shame....
John Kelsey
- Another entry in the internet security hall of shame....
Ian G
- Another entry in the internet security hall of shame....
Roy M. Silvernail
- Another entry in the internet security hall of shame....
Tim Dierks
- Another entry in the internet security hall of shame....
Alaric Dailey
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Trei, Peter
- [Clips] RSA Security Sees Hope in Online Fraud
Florian Weimer
- Another entry in the internet security hall of shame....
R.A. Hettinga
- Another entry in the internet security hall of shame....
Steve Furlong
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Ian G
- Another entry in the internet security hall of shame....
Ian G
- Another entry in the internet security hall of shame....
Eric Rescorla
- Another entry in the internet security hall of shame....
Anne & Lynn Wheeler
- Another entry in the internet security hall of shame....
Derek Atkins
- Another entry in the internet security hall of shame....
Eric Rescorla
- Another entry in the internet security hall of shame....
Adam Back
- Another entry in the internet security hall of shame....
Perry E. Metzger
- Another entry in the internet security hall of shame....
Alaric Dailey
- Another entry in the internet security hall of shame....
Peter Gutmann
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Enzo Michelangeli
- Another entry in the internet security hall of shame....
Steven M. Bellovin
- Fwd: Tor security advisory: DH handshake flaw
astiglic at okiok.com
- Federal Information Assurance Conference 2005, Oct 25-26
Anne & Lynn Wheeler
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Adam Back
- Another entry in the internet security hall of shame....
Anne & Lynn Wheeler
- Another entry in the internet security hall of shame....
Chris Kuethe
- Another entry in the internet security hall of shame....
Peter Saint-Andre
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Peter Saint-Andre
- Another entry in the internet security hall of shame....
Steven M. Bellovin
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Steven M. Bellovin
- Another entry in the internet security hall of shame....
Dave Howe
- reading PINs in "secure" mailers without opening them
Perry E. Metzger
- Another entry in the internet security hall of shame....
Eric Rescorla
- instant lottery cards too, Re: reading PINs in "secure" mailers without opening them
Ed Gerck
- Another entry in the internet security hall of shame....
Aaron Whitehouse
- e2e & security by default (Re: e2e all the way)
Adam Back
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Ian G
- Another entry in the internet security hall of shame....
Ian G
- e2e all the way (Re: Another entry in the internet security hall of shame....)
Dave Howe
- MD5 Collision, Visualised
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- MD5 Collision, Visualised
Steven M. Bellovin
- Another entry in the internet security hall of shame....
Dave Howe
- MD5 Collision, Visualised
Ben Laurie
- Another entry in the internet security hall of shame....
James A. Donald
- Another entry in the internet security hall of shame....
Peter Gutmann
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Another entry in the internet security hall of shame....
Dave Howe
- Fwd: Tor security advisory: DH handshake flaw
Simon Josefsson
- Another entry in the internet security hall of shame....
Gilles DEMARTY
- Another entry in the internet security hall of shame....
james hughes
- Another entry in the internet security hall of shame....
Dave Howe
- Fwd: Tor security advisory: DH handshake flaw
Simon Josefsson
- Fwd: Tor security advisory: DH handshake flaw
astiglic at okiok.com
- Fwd: Tor security advisory: DH handshake flaw
astiglic at okiok.com
- Fwd: Tor security advisory: DH handshake flaw
astiglic at okiok.com
- Another entry in the internet security hall of shame....
Anne & Lynn Wheeler
- Another entry in the internet security hall of shame....
Ian G
- Another entry in the internet security hall of shame....
Nick Owen
- Another entry in the internet security hall of shame....
James A. Donald
- Another entry in the internet security hall of shame....
Peter Gutmann
- Another entry in the internet security hall of shame....
Stephan Neuhaus
- Fwd: Tor security advisory: DH handshake flaw
Ben Laurie
- Fwd: Tor security advisory: DH handshake flaw
Werner Koch
- Fwd: Tor security advisory: DH handshake flaw
Simon Josefsson
- Another entry in the internet security hall of shame....
Ian G
- MD5 Collision, Visualised
Dan Kaminsky
- Another entry in the internet security hall of shame....
Victor Duchovni
- Another entry in the internet security hall of shame....
James A. Donald
- MD5 Visualised, Mark II
Ben Laurie
Last message date:
Wed Aug 31 18:58:33 EDT 2005
Archived on: Sun Aug 7 18:24:37 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).