April 2008 Archives by author
Starting: Tue Apr 1 01:01:14 EDT 2008
Ending: Wed Apr 30 15:36:28 EDT 2008
Messages: 96
- Levels of security according to the easiness to steel biometric data
Ali, Saqib
- Privacy as Contextual Integrity - A lecture by Dr. Nissembaum of NYU
Ali, Saqib
- Snake oil crypto of the day: BabelSecure Samurai
Ali, Saqib
- Cruising the stacks and finding stuff
Allen
- Cruising the stacks and finding stuff
Allen
- more on malicious hardware
Allen
- "Designing and implementing malicious hardware"
Jacob Appelbaum
- Still locked up Shannon crypto work?
Steven M. Bellovin
- 2factor
Steven M. Bellovin
- Declassified NSA publications
Steven M. Bellovin
- Hagelin cipher machine on EBay
Steven M. Bellovin
- privacy expectations Was: SSL and Malicious Hardware/Software
Steven M. Bellovin
- Double Encryption Q
COMINT
- "Designing and implementing malicious hardware"
COMINT
- Levels of security according to the easiness to steel biometric data
Richard Clayton
- Double Encryption Q
Martin James Cochran
- defending against evil in all layers of hardware and software
John Denker
- "Designing and implementing malicious hardware"
James A. Donald
- how to read information from RFID equipped credit cards
Victor Duchovni
- Cruising the stacks and finding stuff
Victor Duchovni
- SSL and Malicious Hardware/Software
Victor Duchovni
- "Designing and implementing malicious hardware"
Adam Fields
- Cruising the stacks and finding stuff
Ian G
- Still locked up Shannon crypto work?
Ed Gerck
- 2factor
Ed Gerck
- "Designing and implementing malicious hardware"
Ed Gerck
- "Designing and implementing malicious hardware"
Ed Gerck
- "Designing and implementing malicious hardware"
Ed Gerck
- "Designing and implementing malicious hardware"
John Gilmore
- more on malicious hardware
Scott Guthery
- how to read information from RFID equipped credit cards
Peter Gutmann
- New results against the Mifare cipher
Peter Gutmann
- [Fwd: Secure Server e-Cert & Developer e-Cert. Comerica TM Connect Web Bank]
Peter Gutmann
- more on malicious hardware
Peter Gutmann
- Levels of security according to the easiness to steel biometric data
Philipp Gühring
- Cruising the stacks and finding stuff
Sandy Harris
- Cruising the stacks and finding stuff
Sandy Harris
- Just update the microcode (was: Re: defending against evil in all layers of hardware and software)
John Ioannidis
- Just update the microcode (was: Re: defending against evil in all layers of hardware and software)
John Ioannidis
- Want to drive a Jaguar?
Stefan Kelm
- no possible brute force Was: Cruising the stacks and finding stuff
Alexander Klimov
- privacy expectations Was: SSL and Malicious Hardware/Software
Alexander Klimov
- Just update the microcode (was: Re: defending against evil in all layers of hardware and software)
Sebastian Krahmer
- "Designing and implementing malicious hardware"
Ivan Krstić
- defending against evil in all layers of hardware and software
Ivan Krstić
- defending against evil in all layers of hardware and software
Ivan Krstić
- 2factor
Leichter, Jerry
- Cruising the stacks and finding stuff
Leichter, Jerry
- no possible brute force Was: Cruising the stacks and finding stuff
Leichter, Jerry
- Declassified NSA publications
Leichter, Jerry
- "Designing and implementing malicious hardware"
Leichter, Jerry
- "Designing and implementing malicious hardware"
Leichter, Jerry
- "Designing and implementing malicious hardware"
Leichter, Jerry
- SSL and Malicious Hardware/Software
Leichter, Jerry
- Declassified NSA publications
Ilya Levin
- Double Encryption Q
Jack Lloyd
- Cruising the stacks and finding stuff
Jack Lloyd
- SSL and Malicious Hardware/Software
Jack Lloyd
- Doubts about efficiency of Shor's factoring algorithm in quantum computers
Charles McElwain
- Shor's algorithm in danger?
Rod Van Meter
- Cruising the stacks and finding stuff
Perry E. Metzger
- Cruising the stacks and finding stuff
Perry E. Metzger
- "Designing and implementing malicious hardware"
Perry E. Metzger
- more on malicious hardware
Perry E. Metzger
- matt blaze on evil hardware
Perry E. Metzger
- "Designing and implementing malicious hardware"
Perry E. Metzger
- "Designing and implementing malicious hardware"
Perry E. Metzger
- "Designing and implementing malicious hardware"
Perry E. Metzger
- defending against evil in all layers of hardware and software
Perry E. Metzger
- Doubts about efficiency of Shor's factoring algorithm in quantum computers
Perry E. Metzger
- defending against evil in all layers of hardware and software
Perry E. Metzger
- [Fwd: Secure Server e-Cert & Developer e-Cert. Comerica TM Connect Web Bank]
Thierry Moreau
- Estimated 10 million dollars lost in parking meter fraud
James Muir
- "Designing and implementing malicious hardware"
Crawford Nathan-HMGT87
- defending against evil in all layers of hardware and software
Stephan Neuhaus
- "Designing and implementing malicious hardware"
Karsten Nohl
- more on malicious hardware
Karsten Nohl
- Levels of security according to the easiness to steel biometric data
Arshad Noor
- [Fwd: Secure Server e-Cert & Developer e-Cert. Comerica TM Connect Web Bank]
Arshad Noor
- [Fwd: Secure Server e-Cert & Developer e-Cert. Comerica TM Connect Web Bank]
Arshad Noor
- Microsoft COFEE
Arshad Noor
- Doubts about efficiency of Shor's factoring algorithm in quantum computers
Ray Perlner
- Mark Dowd's Flash NULL Pointer Vulnerability Exploit
Ryan Phillips
- SSL and Malicious Hardware/Software
Ryan Phillips
- Double Encryption Q
Pehr Söderman
- defending against evil in all layers of hardware and software
Jonathan Thornburg
- "Designing and implementing malicious hardware"
Anne & Lynn Wheeler
- how to read information from RFID equipped credit cards
Nicolas Williams
- TextTell - 1983 - Encrypted Text Transmission
Nap van Zuuren
- Just update the microcode (was: Re: defending against evil in all layers of hardware and software)
alex at alten.org
- 2factor
mheyman at gmail.com
- 2factor
mheyman at gmail.com
- Snake oil crypto of the day: BabelSecure Samurai
james hughes
- Pi, randomness, entropy, unpredictability
travis+ml-cryptography at subspacefield.org
- quantum cryptography broken?
travis+ml-cryptography at subspacefield.org
- Estimated 10 million dollars lost in parking meter fraud
michael taylor
Last message date:
Wed Apr 30 15:36:28 EDT 2008
Archived on: Sun Aug 7 18:25:28 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).