February 2006 Archives by subject
Starting: Wed Feb 1 06:50:24 EST 2006
Ending: Tue Feb 28 23:20:05 EST 2006
Messages: 179
- A processor that can do a DES round in 1 clock
David G. Koontz
- Abuse Resistant Publishing
Ben Laurie
- Attack of the Teleclones
Sean McGrath
- CD shredders, was Re: thoughts on one time pads
Travis H.
- CD shredders, was Re: thoughts on one time pads
Jack Lloyd
- CD shredders, was Re: thoughts on one time pads
Aram Perez
- CD shredders, was Re: thoughts on one time pads
Dave Korn
- CD shredders, was Re: thoughts on one time pads
James Deane
- CD shredders, was Re: thoughts on one time pads
Steven M. Bellovin
- choosing building blocks, was Re: general defensive crypto coding principles
Travis H.
- conservative choice: encrypt then MAC (Re: general defensive crypto coding principles)
Adam Back
- conservative choice: encrypt then MAC (Re: general defensive crypto coding principles)
Whyte, William
- Cracking remaining Enigma messages
Perry E. Metzger
- DHS: Sony rootkit may lead to regulation
leichter_jerrold at emc.com
- distributed password cracking a a product
Steven M. Bellovin
- EDP (entropy distribution protocol), userland PRNG design
Travis H.
- EDP (entropy distribution protocol), userland PRNG design
Eric Rescorla
- EDP (entropy distribution protocol), userland PRNG design
Jason Holt
- EDP (entropy distribution protocol), userland PRNG design
Eric Rescorla
- EDP (entropy distribution protocol), userland PRNG design
Bill Stewart
- Face and fingerprints swiped in Dutch biometric passport crack (anothercard skim vulnerability)
vin at TheWorld.com
- Face and fingerprints swiped in Dutch biometric passport crack (anothercard skim vulnerability)
Adam Shostack
- Face and fingerprints swiped in Dutch biometric passport crack (anothercard skim vulnerability)
Jaap-Henk Hoepman
- Find me a hash
Harald Hanche-Olsen
- FWD: [IP] Encrypting Bittorrent to take out traffic shapers
Adam Fields
- FWD: [IP] Encrypting Bittorrent to take out traffic shapers
Alexander Klimov
- FWD: [IP] Encrypting Bittorrent to take out traffic shapers
Dave Korn
- FWD: [IP] Encrypting Bittorrent to take out traffic shapers
lorenzo
- general defensive crypto coding principles
Travis H.
- general defensive crypto coding principles
Jack Lloyd
- general defensive crypto coding principles
Simon Josefsson
- general defensive crypto coding principles
Sidney Markowitz
- general defensive crypto coding principles
Peter Gutmann
- general defensive crypto coding principles
Peter Gutmann
- general defensive crypto coding principles
Jack Lloyd
- general defensive crypto coding principles
Peter Gutmann
- general defensive crypto coding principles
Travis H.
- general defensive crypto coding principles
Jack Lloyd
- general defensive crypto coding principles
Ben Laurie
- general defensive crypto coding principles
Paul Hoffman
- general defensive crypto coding principles
Ben Laurie
- general defensive crypto coding principles
Peter Gutmann
- general defensive crypto coding principles
Jack Lloyd
- general defensive crypto coding principles
Anton Stiglic
- GnuTLS (libgrypt really) and Postfix
Victor Duchovni
- GnuTLS (libgrypt really) and Postfix
Simon Josefsson
- GnuTLS (libgrypt really) and Postfix
Werner Koch
- GnuTLS (libgrypt really) and Postfix
Ben Laurie
- GnuTLS (libgrypt really) and Postfix
John Denker
- GnuTLS (libgrypt really) and Postfix
Werner Koch
- GnuTLS (libgrypt really) and Postfix
Dave Korn
- GnuTLS (libgrypt really) and Postfix
David Wagner
- GnuTLS (libgrypt really) and Postfix
John Denker
- GnuTLS (libgrypt really) and Postfix
Simon Josefsson
- GnuTLS (libgrypt really) and Postfix
Victor Duchovni
- GnuTLS (libgrypt really) and Postfix
Victor Duchovni
- GnuTLS (libgrypt really) and Postfix
Florian Weimer
- GnuTLS (libgrypt really) and Postfix
Werner Koch
- GnuTLS (libgrypt really) and Postfix
Werner Koch
- GnuTLS (libgrypt really) and Postfix
Werner Koch
- GnuTLS (libgrypt really) and Postfix
Werner Koch
- GnuTLS (libgrypt really) and Postfix
leichter_jerrold at emc.com
- GnuTLS (libgrypt really) and Postfix
James A. Donald
- GnuTLS (libgrypt really) and Postfix
James A. Donald
- GnuTLS (libgrypt really) and Postfix
Victor Duchovni
- GnuTLS (libgrypt really) and Postfix
Victor Duchovni
- GnuTLS (libgrypt really) and Postfix
John Denker
- GnuTLS (libgrypt really) and Postfix
Werner Koch
- GnuTLS (libgrypt really) and Postfix
James A. Donald
- GnuTLS (libgrypt really) and Postfix
Werner Koch
- GnuTLS (libgrypt really) and Postfix
Ben Laurie
- GnuTLS (libgrypt really) and Postfix
Dave Korn
- GnuTLS (libgrypt really) and Postfix
James A. Donald
- GnuTLS (libgrypt really) and Postfix
Daniel Carosone
- GnuTLS (libgrypt really) and Postfix
Victor Duchovni
- GnuTLS (libgrypt really) and Postfix
Steven M. Bellovin
- GnuTLS (libgrypt really) and Postfix
Steven M. Bellovin
- GnuTLS 1.2.10 - Security release
John Gilmore
- hamachi p2p vpn nat-friendly protocol details
Travis H.
- hamachi p2p vpn nat-friendly protocol details
Alex Pankratov
- hamachi p2p vpn nat-friendly protocol details
Travis H.
- hamachi p2p vpn nat-friendly protocol details
Alex Pankratov
- hamachi p2p vpn nat-friendly protocol details
Eric Rescorla
- hamachi p2p vpn nat-friendly protocol details
Alex Pankratov
- HDCP support in PCs is nonexistent now?
John Gilmore
- HDCP support in PCs is nonexistent now?
Peter Gutmann
- Hiding data on 3.5" using "40 track mode"
Travis H.
- Hiding data on 3.5" using "40 track mode"
Dave Howe
- Hiding data on 3.5" using "40 track mode"
Ben Laurie
- Hiding data on 3.5" using "40 track mode"
Peter Gutmann
- Hiding data on 3.5" using "40 track mode"
Dave Howe
- methods of filling encrypted disks
Travis H.
- methods of filling encrypted disks
Ben Laurie
- AW: methods of filling encrypted disks
Kuehn, Ulrich
- Nonrepudiation - in some sense
leichter_jerrold at emc.com
- Nonrepudiation - in some sense
Ben Laurie
- Nonrepudiation - in some sense
leichter_jerrold at emc.com
- Nonrepudiation - in some sense
Victor Duchovni
- Nonrepudiation - in some sense
Weger, B.M.M. de
- Nonrepudiation - in some sense
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
Paul Hoffman
- NPR : E-Mail Encryption Rare in Everyday Use
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
Paul Hoffman
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Philipp Gühring
- NPR : E-Mail Encryption Rare in Everyday Use
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
Stefan Kelm
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Paul Hoffman
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Travis H.
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Ian G
- NPR : E-Mail Encryption Rare in Everyday Use
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
Greg Black
- NPR : E-Mail Encryption Rare in Everyday Use
John Kelsey
- NPR : E-Mail Encryption Rare in Everyday Use
John W Noerenberg II
- NPR : E-Mail Encryption Rare in Everyday Use
Alex Alten
- NPR : E-Mail Encryption Rare in Everyday Use
Alex Alten
- NPR : E-Mail Encryption Rare in Everyday Use
James A. Donald
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Ian G
- NPR : E-Mail Encryption Rare in Everyday Use
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Nicolas Rachinsky
- NPR : E-Mail Encryption Rare in Everyday Use
Matthew Byng-Maddick
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Florian Weimer
- NPR : E-Mail Encryption Rare in Everyday Use
Paul Hoffman
- NPR : E-Mail Encryption Rare in Everyday Use
Trevor Perrin
- NPR : E-Mail Encryption Rare in Everyday Use
Alex Alten
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Gutmann
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
markus reichelt
- NPR : E-Mail Encryption Rare in Everyday Use
Jon Callas
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
John W Noerenberg II
- NPR : E-Mail Encryption Rare in Everyday Use
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
StealthMonger
- NPR : E-Mail Encryption Rare in Everyday Use
Steven M. Bellovin
- NPR : E-Mail Encryption Rare in Everyday Use
dan at geer.org
- PQCrypto: Registration Open
Christopher Wolf
- Sen.: White House Agrees to Spy Law Change
feis
- serious threat models
Steven M. Bellovin
- serious threat models
Jaap-Henk Hoepman
- serious threat models
Matt Blaze
- serious threat models
Perry E. Metzger
- serious threat models
Travis H.
- serious threat models
Anne & Lynn Wheeler
- serious threat models
Sidney Markowitz
- serious threat models
Peter Gutmann
- square roots modulo a prime p
Alexander Klimov
- the return of key escrow?
Steven M. Bellovin
- the return of key escrow?
Chris Olesch
- the return of key escrow?
Peter Gutmann
- the return of key escrow?
Dave Howe
- the return of key escrow?
Peter Clay
- thoughts on one time pads
Travis H.
- training your customers to be phishing victims
Perry E. Metzger
- Unforgeable dialog.
Bowness, Piers
- Unforgeable dialog.
James A. Donald
- Unforgeable dialog.
Trei, Peter
- Unforgeable dialog.
Travis H.
- Unforgeable dialog.
Alex Iliev
- Unforgeable dialog.
Jaap-Henk Hoepman
- Unforgeable dialog.
James A. Donald
- Unforgeable dialog.
Peter Gutmann
- US plans for "Information Operations"
Steven M. Bellovin
- What's the easiest way to crack an RSA key?
Peter Gutmann
- X.509 Phishing license
Victor Duchovni
Last message date:
Tue Feb 28 23:20:05 EST 2006
Archived on: Sun Aug 7 18:24:50 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).