March 2006 Archives by subject
Starting: Wed Mar 1 02:35:18 EST 2006
Ending: Fri Mar 31 10:36:03 EST 2006
Messages: 144
- "Study shows how photonic decoys can foil hackers"
leichter_jerrold at emc.com
- "Study shows how photonic decoys can foil hackers"
Taral
- "Study shows how photonic decoys can foil hackers"
Andrea Pasquinucci
- [Cfrg] HMAC-MD5
vlastimil.klima at volny.cz
- [Cfrg] HMAC-MD5
Victor Duchovni
- [Cfrg] HMAC-MD5
Hal Finney
- [Cfrg] HMAC-MD5
Hal Finney
- [Cfrg] HMAC-MD5
vlastimil.klima at volny.cz
- [tp at ai.mit.edu: Fwd: Re: Any idea of who could help? Thanks!]
R. Hirschfeld
- bounded storage model - why is R organized as 2-d array?
Travis H.
- bounded storage model - why is R organized as 2-d array?
alex at alten.org
- bounded storage model - why is R organized as 2-d array?
Steven M. Bellovin
- bounded storage model - why is R organized as 2-d array?
Ben Laurie
- bounded storage model - why is R organized as 2-d array?
Chris Palmer
- bounded storage model - why is R organized as 2-d array?
Bill Stewart
- bounded storage model - why is R organized as 2-d array?
Alex Alten
- Bug found in GPG
Udhay Shankar N
- bulk quantum computation
Travis H.
- Call for Participation: HOPE#6, July 21-23
Dominick LaTrappe
- Creativity and security
leichter_jerrold at emc.com
- Creativity and security
Olle Mulmo
- Creativity and security
Dave Korn
- Creativity and security
J. Bruce Fields
- Creativity and security
brucee at chunder.com
- Creativity and security
Daniel Carosone
- Creativity and security
Dave Korn
- Creativity and security
leichter_jerrold at emc.com
- Creativity and security
J. Bruce Fields
- Creativity and security
Joseph Ashwood
- Creativity and security
Anne & Lynn Wheeler
- Creativity and security
Anne & Lynn Wheeler
- Creativity and security
brucee at chunder.com
- Creativity and security
Steven M. Bellovin
- Creativity and security
Matt Blaze
- Deciphering Incan khipu
Vin McLellan
- DTLS for Java?
Tom Weinstein
- ECC Wit and Wisdom (Fwd)
Vin McLellan
- Enigma for sale on EBay
Steven M. Bellovin
- Entropy Definition
Perry E. Metzger
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Greg Rose
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Aram Perez
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Jack Lloyd
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Sandy Harris
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Kelsey
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Kelsey
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Hal Finney
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Erik Zenner
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
Ed Gerck
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Kelsey
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Kelsey
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
John Denker
- Entropy Definition (was Re: passphrases with more than 160 bits of entropy)
David Malone
- Greek officials were tapped using law enforcement back door
Perry E. Metzger
- Greek officials were tapped using law enforcement back door
Adam Fields
- Greek officials were tapped using law enforcement back door
Nikos Mavrogiannopoulos
- ISO rejects WAPI (for now)
Joachim Strombergson
- ISO rejects WAPI (for now)
David Johnston
- ISO rejects WAPI (for now)
Joachim Strombergson
- Linux RNG paper
Heyman, Michael
- Linux RNG paper
Bill Frantz
- Linux RNG paper
Victor Duchovni
- Linux RNG paper
Bill Frantz
- Linux RNG paper
Travis H.
- Linux RNG paper
David Malone
- Linux RNG paper
John Kelsey
- Linux RNG paper
leichter_jerrold at emc.com
- Linux RNG paper
Benny Pinkas
- MD5 collisions in one minute
Weger, B.M.M. de
- MD5 collisions in one minute
Max
- more MD5 collisions
Mads Rasmussen
- NPR : E-Mail Encryption Rare in Everyday Use
Bill Stewart
- NPR : E-Mail Encryption Rare in Everyday Use
Bill Stewart
- NPR : E-Mail Encryption Rare in Everyday Use
Udhay Shankar N
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
James A. Donald
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Thoenen
- NPR : E-Mail Encryption Rare in Everyday Use
alex at alten.org
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Anton Stiglic
- NPR : E-Mail Encryption Rare in Everyday Use
Florian Weimer
- NPR : E-Mail Encryption Rare in Everyday Use
Alex Alten
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Gutmann
- NPR : E-Mail Encryption Rare in Everyday Use
Alex Alten
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Gutmann
- NPR : E-Mail Encryption Rare in Everyday Use
Ben Laurie
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Chris Palmer
- NPR : E-Mail Encryption Rare in Everyday Use
James A. Donald
- NPR : E-Mail Encryption Rare in Everyday Use
Victor Duchovni
- NPR : E-Mail Encryption Rare in Everyday Use
Peter Saint-Andre
- Paper summarizing new directions in protecting web users
Amir Herzberg
- Paper summarizing new directions in protecting web users
Jason Holt
- passphrases with more than 160 bits of entropy
Travis H.
- passphrases with more than 160 bits of entropy
Joseph Ashwood
- passphrases with more than 160 bits of entropy
Taral
- passphrases with more than 160 bits of entropy
Stefan Lucks
- passphrases with more than 160 bits of entropy
Thierry Moreau
- passphrases with more than 160 bits of entropy
Alexander Klimov
- passphrases with more than 160 bits of entropy
Whyte, William
- passphrases with more than 160 bits of entropy
Aram Perez
- passphrases with more than 160 bits of entropy
Perry E. Metzger
- passphrases with more than 160 bits of entropy
Aram Perez
- passphrases with more than 160 bits of entropy
leichter_jerrold at emc.com
- passphrases with more than 160 bits of entropy
Perry E. Metzger
- passphrases with more than 160 bits of entropy
Perry E. Metzger
- passphrases with more than 160 bits of entropy
Matt Crawford
- passphrases with more than 160 bits of entropy
Victor Duchovni
- passphrases with more than 160 bits of entropy
Perry E. Metzger
- passphrases with more than 160 bits of entropy
John Denker
- passphrases with more than 160 bits of entropy
Matt Crawford
- PayPad
leichter_jerrold at emc.com
- pipad, was Re: bounded storage model - why is R organized as 2-d array?
leichter_jerrold at emc.com
- pipad, was Re: bounded storage model - why is R organized as 2-d array?
John Kelsey
- pipad, was Re: bounded storage model - why is R organized as 2-d array?
leichter_jerrold at emc.com
- pipad, was Re: bounded storage model - why is R organized as 2-d array?
Travis H.
- Tunnels accelerate MD5 collisions
vlastimil.klima at volny.cz
- Tunnels in Hash Functions: MD5 Collisions in 40 seconds
vlastimil.klima at volny.cz
- Tunnels in Hash Functions: MD5 Collisions in 40 seconds
alex at alten.org
- Uncracked Enigma messages score: 2 done, 1 to go.
Perry E. Metzger
- webcam encryption beats quasar encryption
Heyman, Michael
- webcam encryption beats quasar encryption
James Muir
- webcam encryption beats quasar encryption
leichter_jerrold at emc.com
- World of Warcraft massive surveillance...
Perry E. Metzger
- Your secrets are safe with quasar encryption
Sean McGrath
- Your secrets are safe with quasar encryption
Adam Back
- Your secrets are safe with quasar encryption
Alexander Klimov
- Your secrets are safe with quasar encryption
Joachim Strombergson
- Zfone and ZRTP :: encryption for voip protocols
cybergio
- Zfone and ZRTP :: encryption for voip protocols
Ed Gerck
- Zfone and ZRTP :: encryption for voip protocols
Victor Duchovni
- Zfone and ZRTP :: encryption for voip protocols
Damien Miller
- Zfone and ZRTP :: encryption for voip protocols
Alex Pankratov
- Zfone and ZRTP :: encryption for voip protocols
Alex Pankratov
Last message date:
Fri Mar 31 10:36:03 EST 2006
Archived on: Sun Aug 7 18:24:52 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).