January 2007 Archives by date
Starting: Tue Jan 2 13:43:14 EST 2007
Ending: Wed Jan 31 17:25:00 EST 2007
Messages: 172
- SSL (https, really) accelerators for Linux/Apache?
John Ioannidis
- SSL (https, really) accelerators for Linux/Apache?
Victor Duchovni
- SSL (https, really) accelerators for Linux/Apache?
Scott Mustard
- Fwd: [FDE] Largest Ever Single FDE implementation
Florian Weimer
- SC-based link encryption
Steve Schear
- SSL (https, really) accelerators for Linux/Apache?
Anne & Lynn Wheeler
- Tamperproof, yet playing Tetris.
Perry E. Metzger
- Tamperproof, yet playing Tetris.
Peter Gutmann
- SC-based link encryption
Paul Hoffman
- SC-based link encryption
John Denker
- Tamperproof, yet playing Tetris.
Richard Clayton
- Tamperproof, yet playing Tetris.
Anne & Lynn Wheeler
- (Short) Intro and question
Allen
- (Short) Intro and question
Steven M. Bellovin
- (Short) Intro and question
Ivan Krstić
- (Short) Intro and question
Saqib Ali
- (Short) Intro and question
Chris Kuethe
- secure CRNGs and FIPS (Re: How important is FIPS 140-2 Level 1 cert?)
Matthias Bruestle
- [spock at cert.org: [fc-announce] FC07: Preliminary program and call for participation]
R. Hirschfeld
- [rachna at deas.harvard.edu: [fc-announce] Usable Security--Prelim Program--Jan 8 Hotel Deadline]
R. Hirschfeld
- Tamperproof, yet playing Tetris.
Anne & Lynn Wheeler
- Private Key Generation from Passwords/phrases
Matthias Bruestle
- Fwd: [FDE] Inside interview with Seagate on it's new FDE Drive
Saqib Ali
- A web site that believes in crypto
Steven M. Bellovin
- [Cryptocollectors] STU III 2500
Richard Brisson
- A web site that believes in crypto
Erik Tews
- Private Key Generation from Passwords/phrases
James A. Donald
- Private Key Generation from Passwords/phrases
Joseph Ashwood
- Banking Follies
Perry E. Metzger
- Why AACS will fail
Frank A Stevenson
- How to leak a secret and not get caught
PeterThermos
- [Cryptocollectors] STU III 2500
Steven M. Bellovin
- [Cryptocollectors] STU III 2500
Roy M. Silvernail
- How to leak a secret and not get caught
Marcos el Ruptor
- A web site that believes in crypto
Victor Duchovni
- Banking Follies
John Ioannidis
- SSL Server needs access to raw HTTP data (Request for adivce)
Richard Powell
- Molecular Keypad Lock
silvio
- SSL Server needs access to raw HTTP data (Request for adivce)
Erik Tews
- Banking Follies
Steven M. Bellovin
- [Cryptocollectors] STU III 2500
Rui Paulo
- [Cryptocollectors] STU III 2500
Taral
- SSL Server needs access to raw HTTP data (Request for adivce)
Richard Powell
- SSL Server needs access to raw HTTP data (Request for adivce)
Richard Powell
- SSL Server needs access to raw HTTP data (Request for adivce)
Richard Powell
- Banking Follies
John Ioannidis
- Private Key Generation from Passwords/phrases
Matthias Bruestle
- Private Key Generation from Passwords/phrases
mheyman at gmail.com
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Saqib Ali
- How to leak a secret and not get caught
Jeremy Hansen
- analysis and implementation of LRW
Roland Dowdeswell
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Steven M. Bellovin
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Jonathan Thornburg
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Jonathan Thornburg
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Steve Schear
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Steven M. Bellovin
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Saqib Ali
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Saqib Ali
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Steven M. Bellovin
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Saqib Ali
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Brian Gladman
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Nicholas Bohm
- encrypting files with lots of different keys
Perry E. Metzger
- Banking Follies
Adam Shostack
- Banking Follies
Matt Crawford
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Steve Schear
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Steven M. Bellovin
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
David I. Emery
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Saqib Ali
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Steven M. Bellovin
- Private Key Generation from Passwords/phrases
Allen
- Private Key Generation from Passwords/phrases
Joseph Ashwood
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Anne & Lynn Wheeler
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Jonathan Thornburg
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Saqib Ali
- Private Key Generation from Passwords/phrases
John Denker
- Private Key Generation from Passwords/phrases
David Wagner
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Chris Kuethe
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Damien Miller
- Private Key Generation from Passwords/phrases
John Denker
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Allen
- Private Key Generation from Passwords/phrases
Perry E. Metzger
- Real-world password guessing
Steve Schear
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Saqib Ali
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Victor Duchovni
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Steve Schear
- Private Key Generation from Passwords/phrases
Bill Stewart
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Bill Stewart
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Peter Gutmann
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Jonathan Thornburg
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Victor Duchovni
- Private Key Generation from Passwords/phrases
Travis H.
- MS responds to Gutmann's Vista paper
Ivan Krstić
- MS responds to Gutmann's Vista paper
Ivan Krstić
- Private Key Generation from Passwords/phrases
Steven M. Bellovin
- Private Key Generation from Passwords/phrases
Travis H.
- Private Key Generation from Passwords/phrases
Leichter, Jerry
- analysis and implementation of LRW
james hughes
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
james hughes
- It's a Presidential Mandate, Feds use it. How come you are not using FDE?
james hughes
- analysis and implementation of LRW
David Wagner
- analysis and implementation of LRW
Travis H.
- Private Key Generation from Passwords/phrases
Abe Singer
- analysis and implementation of LRW
Peter Gutmann
- MS responds to Gutmann's Vista paper
Peter Gutmann
- "Free WiFi" man-in-the-middle scam seen in the wild.
Perry E. Metzger
- "Free WiFi" man-in-the-middle scam seen in the wild.
Derek Atkins
- "Free WiFi" man-in-the-middle scam seen in the wild.
Matthias Bruestle
- "Free WiFi" man-in-the-middle scam seen in the wild.
Roy M. Silvernail
- "Free WiFi" man-in-the-middle scam seen in the wild.
Perry E. Metzger
- Private Key Generation from Passwords/phrases
Matthias Bruestle
- analysis and implementation of LRW
Alexander Klimov
- analysis and implementation of LRW
Andrea Pasquinucci
- Fw: NIST announces Draft Requirements and Evaluation Criteria for New Hash Algorithms
Steven M. Bellovin
- analysis and implementation of LRW
Ben Laurie
- analysis and implementation of LRW
David Wagner
- more on NIST hash competition
Perry E. Metzger
- Forwarded: Request for Comments on primality testing
Steven M. Bellovin
- more on NIST hash competition
Ivan Krstić
- analysis and implementation of LRW
Peter Gutmann
- Private Key Generation from Passwords/phrases
Bill Stewart
- analysis and implementation of LRW
Peter Gutmann
- analysis and implementation of LRW
David Wagner
- OT: SSL certificate chain problems
Travis H.
- Attacking the hash (WAS: Private Key Generation from Passwords/phrases)
Allen
- Private Key Generation from Passwords/phrases
Allen
- "IEEE 1667" approved
Perry E. Metzger
- OT: SSL certificate chain problems
Massimiliano Pala
- more on NIST hash competition
Paul Hoffman
- "Free WiFi" man-in-the-middle scam seen in the wild.
James A. Donald
- OT: SSL certificate chain problems
Victor Duchovni
- OT: SSL certificate chain problems
Erik Tews
- analysis and implementation of LRW
Allen
- block cipher modes and collisions
Travis H.
- more on NIST hash competition
Peter Gutmann
- OT: SSL certificate chain problems
Stefan Kelm
- analysis and implementation of LRW
Hal Finney
- analysis and implementation of LRW
Victor Duchovni
- OT: SSL certificate chain problems
Peter Gutmann
- more on NIST hash competition
Paul Hoffman
- OT: SSL certificate chain problems
Victor Duchovni
- study shows "extended validation" TLS certs ineffective
Perry E. Metzger
- Intuitive cryptography that's also practical and secure.
Matt Blaze
- Intuitive cryptography that's also practical and secure.
Steven M. Bellovin
- OT: SSL certificate chain problems
Peter Gutmann
- Intuitive cryptography that's also practical and secure.
Ed Gerck
- "Free WiFi" man-in-the-middle scam seen in the wild.
Florian Weimer
- Intuitive cryptography that's also practical and secure.
Ed Gerck
- News.com: IBM donates new privacy tool to open-source Higgins
John Gilmore
- data under one key, was Re: analysis and implementation of LRW
Travis H.
- OT: SSL certificate chain problems
Victor Duchovni
- Private Key Generation from Passwords/phrases
Steven M. Bellovin
- OT: SSL certificate chain problems
Thor Lancelot Simon
- OT: SSL certificate chain problems
Victor Duchovni
- length-extension and Merkle-Damgard hashes
Travis H.
- Private Key Generation from Passwords/phrases
Abe Singer
- Private Key Generation from Passwords/phrases
Alexander Klimov
- News.com: IBM donates new privacy tool to open-source Higgins
Anne & Lynn Wheeler
- data under one key, was Re: analysis and implementation of LRW
Allen
- length-extension and Merkle-Damgard hashes
Jeremy Hansen
- Chaos on a chip
Sean McGrath
- Intuitive cryptography that's also practical and secure.
Andrea Pasquinucci
- Intuitive cryptography that's also practical and secure.
Leichter, Jerry
- Intuitive cryptography that's also practical and secure.
Steven M. Bellovin
- Intuitive cryptography that's also practical and secure.
Leichter, Jerry
- Intuitive cryptography that's also practical and secure.
Matt Blaze
- OT: SSL certificate chain problems
Peter Gutmann
- OT: SSL certificate chain problems
Victor Duchovni
- Intuitive cryptography that's also practical and secure.
Anton Stiglic
- Private Key Generation from Passwords/phrases
Anton Stiglic
- length-extension and Merkle-Damgard hashes
Amir Herzberg
- OT: SSL certificate chain problems
Geoffrey Hird
Last message date:
Wed Jan 31 17:25:00 EST 2007
Archived on: Sun Aug 7 18:25:04 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).