October 2006 Archives by author
Starting: Sun Oct 1 18:30:47 EDT 2006
Ending: Tue Oct 31 22:41:58 EST 2006
Messages: 103
- OpenSSL PKCS #7 supports AES & SHA-2 ?
Tolga Acar
- Can you keep a secret? This encrypted drive can...
Saqib Ali
- OpenSSL PKCS #7 supports AES & SHA-2 ?
Alex Alten
- OpenSSL PKCS #7 supports AES & SHA-2 ?
Alex Alten
- OpenSSL PKCS #7 supports AES & SHA-2 ?
Alex Alten
- Circle Bank plays with two-factor authentication
Jason Axley
- TPM & disk crypto
Adam Back
- TPM & disk crypto
Adam Back
- handling weak keys using random selection and CSPRNGs
Steven M. Bellovin
- Government crypto?
Steven M. Bellovin
- handling weak keys using random selection and CSPRNGs
Steven M. Bellovin
- physical-layer traffic analysis
Steven M. Bellovin
- Traffic Analysis References
Steven M. Bellovin
- [Cfrg] Applications of target collisions: Pre or post-dating MD5-based RFC 3161 time-stamp tokens
Steven M. Bellovin
- Are laptop search & seizures increasing use of disk crypto?
Steven M. Bellovin
- DIMACS Workshop on Information Security Economics
Linda Casals
- DIMACS Workshop on Information Security Economics
Linda Casals
- Traffic Analysis References
George Danezis
- signing all outbound email
James A. Donald
- signing all outbound email
James A. Donald
- Hamiltonian path as protection against DoS.
James A. Donald
- Why the exponent 3 error happened:
James A. Donald
- TPM & disk crypto
James A. Donald
- TPM & disk crypto
James A. Donald
- TPM & disk crypto
James A. Donald
- hashes on restricted domains: random functions or permutations?
James A. Donald
- hashes on restricted domains: random functions or permutations?
Victor Duchovni
- hashes on restricted domains: random functions or permutations?
Victor Duchovni
- TPM & disk crypto
John Gilmore
- TPM & disk crypto
Brian Gladman
- Applications of target collisions: Pre or post-dating MD5-based RFC 3161 time-stamp tokens
Alfonso De Gregorio
- [Cfrg] Applications of target collisions: Pre or post-dating MD5-based RFC 3161 time-stamp tokens
Alfonso De Gregorio
- TPM & disk crypto
Travis H.
- The Geheimschreiber Secret - Swedish WWII SIGINT
Travis H.
- wanted: mod arith equivalences/tautologies
Travis H.
- TPM & disk crypto
Travis H.
- TPM & disk crypto
Travis H.
- deriving multiple keys from one passphrase
Travis H.
- Discussion of SIGABA, FPGA query, automated cipher construction, &c.
Travis H.
- handling weak keys using random selection and CSPRNGs
Travis H.
- TPM & disk crypto
Travis H.
- handling weak keys using random selection and CSPRNGs
Travis H.
- hashes on restricted domains: random functions or permutations?
Travis H.
- Traffic Analysis References
Travis H.
- Traffic Analysis References
Jeremy Hansen
- TPM & disk crypto
Martin Hermanowski
- [spock at cert.org: [fc-announce] CFP EXTENDED DEADLINE (Oct 16): Financial Cryptography 2007, Feb 12-15, 2007, Tobago]
R. Hirschfeld
- TPM & disk crypto
John Ioannidis
- TPM & disk crypto
Alexander Klimov
- TPM & disk crypto
Alexander Klimov
- TPM & disk crypto
Alexander Klimov
- TPM & disk crypto
Ivan Krstić
- TPM & disk crypto
Ivan Krstić
- TPM & disk crypto
Ivan Krstić
- Can you keep a secret? This encrypted drive can...
Ivan Krstić
- Can you keep a secret? This encrypted drive can...
Ivan Krstić
- TPM & disk crypto
Kuehn, Ulrich
- TPM & disk crypto
Kuehn, Ulrich
- TPM & disk crypto
Kuehn, Ulrich
- handling weak keys using random selection and CSPRNGs
Leichter, Jerry
- handling weak keys using random selection and CSPRNGs
Leichter, Jerry
- handling weak keys using random selection and CSPRNGs
Leichter, Jerry
- signing all outbound email
John Levine
- Circle Bank plays with two-factor authentication
Peter van Liesdonk
- Traffic Analysis References
Leandro Meiners
- handling weak keys using random selection and CSPRNGs
Perry E. Metzger
- Thirty Years of Public Key Cryptography
Perry E. Metzger
- IEEE storage encryption standards
Perry E. Metzger
- Spammer using Graphical Steganography
Damien Miller
- Are laptop search & seizures increasing use of disk crypto?
Udhay Shankar N
- Passwords jump-started Fumo probe
Nick Owen
- [Cfrg] Applications of target collisions: Pre or post-dating MD5-based RFC 3161 time-stamp tokens
Christian Rechberger
- handling weak keys using random selection and CSPRNGs
Greg Rose
- handling weak keys using random selection and CSPRNGs
Greg Rose
- hashes on restricted domains: random functions or permutations?
Greg Rose
- handling weak keys using random selection and CSPRNGs
Marcos el Ruptor
- handling weak keys using random selection and CSPRNGs
Marcos el Ruptor
- TPM & disk crypto
Thor Lancelot Simon
- Spammer using Graphical Steganography
Bill Stewart
- Traffic Analysis References
Anton Stiglic
- TPM & disk crypto
Erik Tews
- TPM & disk crypto
Erik Tews
- TPM & disk crypto
Erik Tews
- TPM & disk crypto
Erik Tews
- deriving multiple keys from one passphrase
Thomas
- deriving multiple keys from one passphrase
Thomas
- deriving multiple keys from one passphrase
Thomas
- target collisions and colliding certificates with different identities
Weger, B.M.M. de
- [Cfrg] Applications of target collisions: Pre or post-dating MD5-based RFC 3161 time-stamp tokens
Weger, B.M.M. de
- Hamiltonian path as protection against DOS.
Florian Weimer
- signing all outbound email
Anne & Lynn Wheeler
- TPM & disk crypto
Anne & Lynn Wheeler
- hashes on restricted domains: random functions or permutations?
Anne & Lynn Wheeler
- Flaw exploited in RFID-enabled passports
Anne & Lynn Wheeler
- OpenSSL PKCS #7 supports AES & SHA-2 ?
Whyte, William
- TPM & disk crypto
cyphrpunk
- TPM & disk crypto
cyphrpunk
- TPM & disk crypto
cyphrpunk
- TPM & disk crypto
cyphrpunk
- Circle Bank plays with two-factor authentication
leichter_jerrold at emc.com
- obituary
dan at geer.org
- Read the reviews
dan at geer.org
- Are laptop search & seizures increasing use of disk crypto?
dave kleiman
Last message date:
Tue Oct 31 22:41:58 EST 2006
Archived on: Sun Aug 7 18:25:02 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).