March 2006 Archives by author
Starting: Wed Mar 1 02:35:18 EST 2006
Ending: Fri Mar 31 10:36:03 EST 2006
Messages: 144
- NPR : E-Mail Encryption Rare in Everyday Use
Alex Alten
- NPR : E-Mail Encryption Rare in Everyday Use
Alex Alten
- bounded storage model - why is R organized as 2-d array?
Alex Alten
- passphrases with more than 160 bits of entropy
Joseph Ashwood
- Creativity and security
Joseph Ashwood
- Your secrets are safe with quasar encryption
Adam Back
- bounded storage model - why is R organized as 2-d array?
Steven M. Bellovin
- Creativity and security
Steven M. Bellovin
- Enigma for sale on EBay
Steven M. Bellovin
- Creativity and security
Matt Blaze
- Creativity and security
Daniel Carosone
- passphrases with more than 160 bits of entropy
Matt Crawford
- passphrases with more than 160 bits of entropy
Matt Crawford
- passphrases with more than 160 bits of entropy
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- NPR : E-Mail Encryption Rare in Everyday Use
James A. Donald
- NPR : E-Mail Encryption Rare in Everyday Use
James A. Donald
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- Zfone and ZRTP :: encryption for voip protocols
Victor Duchovni
- passphrases with more than 160 bits of entropy
Victor Duchovni
- Linux RNG paper
Victor Duchovni
- [Cfrg] HMAC-MD5
Victor Duchovni
- Greek officials were tapped using law enforcement back door
Adam Fields
- Creativity and security
J. Bruce Fields
- Creativity and security
J. Bruce Fields
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Hal Finney
- [Cfrg] HMAC-MD5
Hal Finney
- [Cfrg] HMAC-MD5
Hal Finney
- Linux RNG paper
Bill Frantz
- Linux RNG paper
Bill Frantz
- Zfone and ZRTP :: encryption for voip protocols
Ed Gerck
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Ed Gerck
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Gutmann
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Gutmann
- bulk quantum computation
Travis H.
- bounded storage model - why is R organized as 2-d array?
Travis H.
- pipad, was Re: bounded storage model - why is R organized as 2-d array?
Travis H.
- passphrases with more than 160 bits of entropy
Travis H.
- Linux RNG paper
Travis H.
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Sandy Harris
- Paper summarizing new directions in protecting web users
Amir Herzberg
- Linux RNG paper
Heyman, Michael
- webcam encryption beats quasar encryption
Heyman, Michael
- [tp at ai.mit.edu: Fwd: Re: Any idea of who could help? Thanks!]
R. Hirschfeld
- Paper summarizing new directions in protecting web users
Jason Holt
- ISO rejects WAPI (for now)
David Johnston
- pipad, was Re: bounded storage model - why is R organized as 2-d array?
John Kelsey
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Kelsey
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Kelsey
- Linux RNG paper
John Kelsey
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Kelsey
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Kelsey
- passphrases with more than 160 bits of entropy
Alexander Klimov
- Your secrets are safe with quasar encryption
Alexander Klimov
- Creativity and security
Dave Korn
- Creativity and security
Dave Korn
- Call for Participation: HOPE#6, July 21-23
Dominick LaTrappe
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- bounded storage model - why is R organized as 2-d array?
Ben Laurie
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Jack Lloyd
- passphrases with more than 160 bits of entropy
Stefan Lucks
- Linux RNG paper
David Malone
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
David Malone
- Greek officials were tapped using law enforcement back door
Nikos Mavrogiannopoulos
- MD5 collisions in one minute
Max
- Your secrets are safe with quasar encryption
Sean McGrath
- ECC Wit and Wisdom (Fwd)
Vin McLellan
- Deciphering Incan khipu
Vin McLellan
- Uncracked Enigma messages score: 2 done, 1 to go.
Perry E. Metzger
- World of Warcraft massive surveillance...
Perry E. Metzger
- passphrases with more than 160 bits of entropy
Perry E. Metzger
- passphrases with more than 160 bits of entropy
Perry E. Metzger
- passphrases with more than 160 bits of entropy
Perry E. Metzger
- passphrases with more than 160 bits of entropy
Perry E. Metzger
- Greek officials were tapped using law enforcement back door
Perry E. Metzger
- Entropy Definition
Perry E. Metzger
- Zfone and ZRTP :: encryption for voip protocols
Damien Miller
- passphrases with more than 160 bits of entropy
Thierry Moreau
- webcam encryption beats quasar encryption
James Muir
- Creativity and security
Olle Mulmo
- NPR : E-Mail Encryption Rare in Everyday Use
Udhay Shankar N
- Bug found in GPG
Udhay Shankar N
- bounded storage model - why is R organized as 2-d array?
Chris Palmer
- NPR : E-Mail Encryption Rare in Everyday Use
Chris Palmer
- Zfone and ZRTP :: encryption for voip protocols
Alex Pankratov
- Zfone and ZRTP :: encryption for voip protocols
Alex Pankratov
- "Study shows how photonic decoys can foil hackers"
Andrea Pasquinucci
- passphrases with more than 160 bits of entropy
Aram Perez
- passphrases with more than 160 bits of entropy
Aram Perez
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Aram Perez
- Linux RNG paper
Benny Pinkas
- more MD5 collisions
Mads Rasmussen
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Greg Rose
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
Bill Stewart
- NPR : E-Mail Encryption Rare in Everyday Use
Bill Stewart
- bounded storage model - why is R organized as 2-d array?
Bill Stewart
- NPR : E-Mail Encryption Rare in Everyday Use
Anton Stiglic
- ISO rejects WAPI (for now)
Joachim Strombergson
- ISO rejects WAPI (for now)
Joachim Strombergson
- Your secrets are safe with quasar encryption
Joachim Strombergson
- "Study shows how photonic decoys can foil hackers"
Taral
- passphrases with more than 160 bits of entropy
Taral
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Thoenen
- MD5 collisions in one minute
Weger, B.M.M. de
- NPR : E-Mail Encryption Rare in Everyday Use
Florian Weimer
- DTLS for Java?
Tom Weinstein
- Creativity and security
Anne & Lynn Wheeler
- Creativity and security
Anne & Lynn Wheeler
- passphrases with more than 160 bits of entropy
Whyte, William
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Erik Zenner
- NPR : E-Mail Encryption Rare in Everyday Use
alex at alten.org
- bounded storage model - why is R organized as 2-d array?
alex at alten.org
- Tunnels in Hash Functions: MD5 Collisions in 40 seconds
alex at alten.org
- Creativity and security
brucee at chunder.com
- Creativity and security
brucee at chunder.com
- Zfone and ZRTP :: encryption for voip protocols
cybergio
- "Study shows how photonic decoys can foil hackers"
leichter_jerrold at emc.com
- Creativity and security
leichter_jerrold at emc.com
- pipad, was Re: bounded storage model - why is R organized as 2-d array?
leichter_jerrold at emc.com
- pipad, was Re: bounded storage model - why is R organized as 2-d array?
leichter_jerrold at emc.com
- passphrases with more than 160 bits of entropy
leichter_jerrold at emc.com
- PayPad
leichter_jerrold at emc.com
- Linux RNG paper
leichter_jerrold at emc.com
- Creativity and security
leichter_jerrold at emc.com
- webcam encryption beats quasar encryption
leichter_jerrold at emc.com
- Tunnels in Hash Functions: MD5 Collisions in 40 seconds
vlastimil.klima at volny.cz
- Tunnels accelerate MD5 collisions
vlastimil.klima at volny.cz
- [Cfrg] HMAC-MD5
vlastimil.klima at volny.cz
- [Cfrg] HMAC-MD5
vlastimil.klima at volny.cz
Last message date:
Fri Mar 31 10:36:03 EST 2006
Archived on: Sun Aug 7 18:24:52 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).