July 2009 Archives by date
Starting: Wed Jul 1 04:48:05 EDT 2009
Ending: Fri Jul 31 17:49:35 EDT 2009
Messages: 112
- What will happen to your crypto keys when you die?
Udhay Shankar N
- password safes for mac
Adam Shostack
- password safes for mac
Perry E. Metzger
- password safes for mac
Victor Duchovni
- password safes for mac
Nicolas Williams
- password safes for mac
Nicolas Williams
- password safes for mac
Adam Shostack
- password safes for mac
Adam Shostack
- password safes for mac
Anne & Lynn Wheeler
- AES-256 attacked with time complexity 2^119
Perry E. Metzger
- MD6 withdrawn from SHA-3 competition
Perry E. Metzger
- What will happen to your crypto keys when you die?
silky
- Fluff Article from the WSJournal -- Deciphering a Message to Thomas Jefferson
James Vogel
- What will happen to your crypto keys when you die?
Jack Lloyd
- What will happen to your crypto keys when you die?
Jon Callas
- MD6 withdrawn from SHA-3 competition
Joseph Ashwood
- MD6 withdrawn from SHA-3 competition
Steven M. Bellovin
- What will happen to your crypto keys when you die?
silky
- MD6 withdrawn from SHA-3 competition
Brandon Enright
- MD6 withdrawn from SHA-3 competition
Hal Finney
- MD6 withdrawn from SHA-3 competition
Paul Hoffman
- MD6 withdrawn from SHA-3 competition
Paul Hoffman
- MD6 withdrawn from SHA-3 competition
Ray Dillinger
- MD6 withdrawn from SHA-3 competition
Chen Ke-Fei Lin
- MD6 withdrawn from SHA-3 competition
Josh Rubin
- Weakness in Social Security Numbers Is Found
Ali, Saqib
- Weakness in Social Security Numbers Is Found
Bill Frantz
- Weakness in Social Security Numbers Is Found
dan at geer.org
- Very high rate true random number generation
Jerry Leichter
- Weakness in Social Security Numbers Is Found
Darren J Moffat
- 112-bit prime ECDLP solved
Joppe Bos
- Weakness in Social Security Numbers Is Found
Jerry Leichter
- HSM outage causes root CA key loss
Peter Gutmann
- Physical security rather than crypto---but perhaps of interest
Charles Jackson
- 112-bit prime ECDLP solved
James A. Donald
- HSM outage causes root CA key loss
Jeffrey I. Schiller
- HSM outage causes root CA key loss
Stefan Kelm
- HSM outage causes root CA key loss
Charles McElwain
- HSM outage causes root CA key loss
Weger, B.M.M. de
- HSM outage causes root CA key loss
Nicolas Williams
- HSM outage causes root CA key loss
Paul Hoffman
- HSM outage causes root CA key loss
Dirk-Willem van Gulik
- 112-bit prime ECDLP solved
Tanja Lange
- HSM outage causes root CA key loss
Peter Gutmann
- HSM outage causes root CA key loss
Peter Gutmann
- HSM outage causes root CA key loss
Peter Gutmann
- HSM outage causes root CA key loss
Weger, B.M.M. de
- spyware on Blackberries
Steven M. Bellovin
- 112-bit prime ECDLP solved
James A. Donald
- Physical security rather than crypto---but perhaps of interest
Darren J Moffat
- Physical security rather than crypto---but perhaps of interest
Ali, Saqib
- 112-bit prime ECDLP solved
james hughes
- Intercepting Microsoft wireless keyboard communications
travis+ml-cryptography at subspacefield.org
- XML signature HMAC truncation authentication bypass
Leandro Meiners
- work factor calculation for brute-forcing crypto
travis+ml-cryptography at subspacefield.org
- 112-bit prime ECDLP solved
Tanja Lange
- XML signature HMAC truncation authentication bypass
Peter Gutmann
- work factor calculation for brute-forcing crypto
David Wagner
- 112-bit prime ECDLP solved
Zooko Wilcox-O'Hearn
- why hyperelliptic curves?
Zooko Wilcox-O'Hearn
- work factor calculation for brute-forcing crypto
David Malone
- 112-bit prime ECDLP solved
Paul Hoffman
- 112-bit prime ECDLP solved
Zooko Wilcox-O'Hearn
- XML signature HMAC truncation authentication bypass
Jon Callas
- New Technology to Make Digital Data Disappear, on Purpose
Ali, Saqib
- spyware on Blackberries
Perry E. Metzger
- Zooko's semi-private keys
Hal Finney
- New Technology to Make Digital Data Disappear, on Purpose
dan at geer.org
- Fast MAC algorithms?
Nicolas Williams
- New Technology to Make Digital Data Disappear, on Purpose
Perry E. Metzger
- Fast MAC algorithms?
Joseph Ashwood
- Fast MAC algorithms?
Jack Lloyd
- Fast MAC algorithms?
Nicolas Williams
- Zooko's semi-private keys
Jerry Leichter
- Fast MAC algorithms?
mheyman at gmail.com
- Fast MAC algorithms?
Joseph Ashwood
- New Technology to Make Digital Data Disappear, on Purpose
Jerry Leichter
- Fast MAC algorithms?
Peter Gutmann
- Fast MAC algorithms?
mheyman at gmail.com
- Fast MAC algorithms?
Nicolas Williams
- Fast MAC algorithms?
james hughes
- Fast MAC algorithms?
John Gilmore
- Fast MAC algorithms?
Peter Gutmann
- Fast MAC algorithms?
james hughes
- Fast MAC algorithms?
Darren J Moffat
- Hacker Says iPhone 3GS Encryption Is ‘Useless’ for Businesses
mheyman at gmail.com
- cleversafe says: 3 Reasons Why Encryption is Overrated
Zooko Wilcox-O'Hearn
- NIST announces SHA-3 round 2 candidates
Jack Lloyd
- cleversafe says: 3 Reasons Why Encryption is Overrated
james hughes
- cleversafe says: 3 Reasons Why Encryption is Overrated
Jerry Leichter
- XML signature HMAC truncation authentication bypass
Peter Gutmann
- The latest Flash vulnerability and monoculture
Perry E. Metzger
- Fast MAC algorithms?
James A. Donald
- XML signature HMAC truncation authentication bypass
Jon Callas
- ADMIN: slight list hiccup today
Perry E. Metzger
- Fast MAC algorithms?
james hughes
- The latest Flash vulnerability and monoculture
Jerry Leichter
- The latest Flash vulnerability and monoculture
Perry E. Metzger
- The latest Flash vulnerability and monoculture
Jerry Leichter
- The latest Flash vulnerability and monoculture
Peter Gutmann
- The latest Flash vulnerability and monoculture
Peter Gutmann
- XML signature HMAC truncation authentication bypass
Peter Gutmann
- The latest Flash vulnerability and monoculture
John Gilmore
- The latest Flash vulnerability and monoculture
Perry E. Metzger
- A Basic Rabin-Williams Digital Signature Specification
Thierry Moreau
- XML signature HMAC truncation authentication bypass
Jon Callas
- The latest Flash vulnerability and monoculture
dan at geer.org
- XML signature HMAC truncation authentication bypass
Peter Gutmann
- XML signature HMAC truncation authentication bypass
Bill Stewart
- New Technology to Make Digital Data Disappear, on Purpose
Ali, Saqib
- The clouds are not random enough
Ali, Saqib
- cleversafe says: 3 Reasons Why Encryption is Overrated
Zooko Wilcox-O'Hearn
Last message date:
Fri Jul 31 17:49:35 EDT 2009
Archived on: Sun Aug 7 18:26:19 EDT 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).