June 2014 Archives by subject
Starting: Sun Jun 1 00:46:05 EDT 2014
Ending: Mon Jun 30 18:48:24 EDT 2014
Messages: 533
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Jerry Leichter
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Ben Laurie
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Zooko Wilcox-OHearn
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Salz, Rich
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Dirk-Willem van Gulik
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
ianG
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
ianG
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Theodore Ts'o
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Salz, Rich
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Peter Gutmann
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Dirk-Willem van Gulik
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
James A. Donald
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
John Kelsey
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Theodore Ts'o
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
ianG
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Theodore Ts'o
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
ianG
- [Cryptography] "Is FIPS 140-2 Actively harmful to software?"
Tom Mitchell
- [Cryptography] "Perfect Forward Secrecy - The Next Step in Data Security"
Jerry Leichter
- [Cryptography] "Perfect Forward Secrecy - The Next Step in Data Security"
Viktor Dukhovni
- [Cryptography] "Perfect Forward Secrecy - The Next Step in Data Security"
Tony Arcieri
- [Cryptography] 0x7D531E84 Disseminating
John Young
- [Cryptography] [cryptography] basing conclusions on facts
Stephen Farrell
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Tanja Lange
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Thierry Moreau
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Tanja Lange
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Stephan Neuhaus
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
ianG
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Jerry Leichter
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Dave Horsfall
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Tony Arcieri
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Dave Horsfall
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
ianG
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
John Gilmore
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
ianG
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Tim Dierks
- [Cryptography] [cryptography] Dual EC backdoor was patented by Certicom?
Thierry Moreau
- [Cryptography] [cryptography] Help investigate cell phone snooping by police nationwide
John Young
- [Cryptography] [cryptography] Help investigate cell phone snooping by police nationwide
Bill Stewart
- [Cryptography] [cryptography] Help investigate cell phone snooping by police nationwide
dan at geer.org
- [Cryptography] [cryptography] Help investigate cell phone snooping by police nationwide
dan at geer.org
- [Cryptography] [cryptography] How big a speedup through storage?
grarpamp
- [Cryptography] [cryptography] How big a speedup through storage?
grarpamp
- [Cryptography] [cryptography] How big a speedup through storage?
Lodewijk andré de la porte
- [Cryptography] [cryptography] How big a speedup through storage?
ianG
- [Cryptography] [cryptography] How big a speedup through storage?
Lodewijk andré de la porte
- [Cryptography] [cryptography] Internet Giants erect barriers to spy agencies
John Young
- [Cryptography] [cryptography] WG Review: TCP Increased Security (tcpinc)
Natanael
- [Cryptography] [rainer.boehme at uni-muenster.de: [fc-announce] Financial Cryptography 2015 - Call for Papers - Deadline: 15 Sep 2014]
R. Hirschfeld
- [Cryptography] ADMIN (sort of): Opportunistic TLS now turned on for list server
Perry E. Metzger
- [Cryptography] ADMIN (sort of): Opportunistic TLS now turned on for list server
ianG
- [Cryptography] ADMIN (sort of): Opportunistic TLS now turned on for list server
Dave Horsfall
- [Cryptography] ADMIN (sort of): Opportunistic TLS now turned on for list server
Perry E. Metzger
- [Cryptography] ADMIN (sort of): Opportunistic TLS now turned on for list server
Perry E. Metzger
- [Cryptography] ADMIN: and thanks... (was ADMIN: Rules for posting to the Cryptography List)
Perry E. Metzger
- [Cryptography] ADMIN: A reminder about top posting
Perry E. Metzger
- [Cryptography] ADMIN: A reminder about top posting
xor
- [Cryptography] ADMIN: A reminder about top posting
Perry E. Metzger
- [Cryptography] ADMIN: A reminder about top posting
Tom Mitchell
- [Cryptography] ADMIN: Rules for posting to the Cryptography List
Tamzen Cannoy
- [Cryptography] ADMIN: Swift-ly Tilting Offtopic
Perry E. Metzger
- [Cryptography] ADMIN: will the owner of yog.abyss.ca please get in touch?
Perry E. Metzger
- [Cryptography] ADMIN Re: What has Bitcoin achieved?
Tamzen Cannoy
- [Cryptography] Aggregate signatures
xor
- [Cryptography] Aggregate signatures
ianG
- [Cryptography] Aggregate signatures
Steve Weis
- [Cryptography] Aggregate signatures
xor
- [Cryptography] Aggregate signatures
Dirk-Willem van Gulik
- [Cryptography] Aggregate signatures
ianG
- [Cryptography] Aggregate signatures
Bear
- [Cryptography] Aggregate signatures
xor
- [Cryptography] Aggregate signatures
Tony Arcieri
- [Cryptography] Aggregate signatures
Tom Mitchell
- [Cryptography] Aggregate signatures
xor
- [Cryptography] Aggregate signatures
Jae Kwon
- [Cryptography] Aggregate signatures
xor
- [Cryptography] Aggregate signatures
James A. Donald
- [Cryptography] Almost decentralized currency
L. M. Goodman
- [Cryptography] Almost decentralized currency
Lodewijk andré de la porte
- [Cryptography] Almost decentralized currency
ianG
- [Cryptography] Almost decentralized currency
L. M. Goodman
- [Cryptography] Almost decentralized currency
Lodewijk andré de la porte
- [Cryptography] Almost decentralized currency
L. M. Goodman
- [Cryptography] A Primer on Provenance
Tom Mitchell
- [Cryptography] a question on consensus over algorithmic agility
ianG
- [Cryptography] a question on consensus over algorithmic agility
Stephen Farrell
- [Cryptography] a question on consensus over algorithmic agility
Zooko Wilcox-OHearn
- [Cryptography] a question on consensus over algorithmic agility
ianG
- [Cryptography] a question on consensus over algorithmic agility
Tony Arcieri
- [Cryptography] a question on consensus over algorithmic agility
Bear
- [Cryptography] a question on consensus over algorithmic agility
Stephen Farrell
- [Cryptography] a question on consensus over algorithmic agility
Phillip Hallam-Baker
- [Cryptography] a question on consensus over algorithmic agility
ianG
- [Cryptography] a question on consensus over algorithmic agility
ianG
- [Cryptography] a question on consensus over algorithmic agility
Peter Fairbrother
- [Cryptography] a question on consensus over algorithmic agility
Stephan Neuhaus
- [Cryptography] a question on consensus over algorithmic agility
John Kelsey
- [Cryptography] a question on consensus over algorithmic agility
ianG
- [Cryptography] a question on consensus over algorithmic agility
Jon Callas
- [Cryptography] a question on consensus over algorithmic agility
Peter Fairbrother
- [Cryptography] a question on consensus over algorithmic agility
Peter Fairbrother
- [Cryptography] a question on consensus over algorithmic agility
ianG
- [Cryptography] a question on consensus over algorithmic agility
Viktor Dukhovni
- [Cryptography] a question on consensus over algorithmic agility
Peter Fairbrother
- [Cryptography] a question on consensus over algorithmic agility
Arnold Reinhold
- [Cryptography] a question on consensus over algorithmic agility
Christian Huitema
- [Cryptography] a question on consensus over algorithmic agility
Jerry Leichter
- [Cryptography] a question on consensus over algorithmic agility
John Kelsey
- [Cryptography] a question on consensus over algorithmic agility
John Kelsey
- [Cryptography] a question on consensus over algorithmic agility
Phillip Hallam-Baker
- [Cryptography] a question on consensus over algorithmic agility
Jerry Leichter
- [Cryptography] a question on consensus over algorithmic agility
Jerry Leichter
- [Cryptography] a question on consensus over algorithmic agility
Phillip Hallam-Baker
- [Cryptography] a question on consensus over algorithmic agility
Richard Outerbridge
- [Cryptography] a question on consensus over algorithmic agility
Tom Mitchell
- [Cryptography] Back door competition for TrueCrypt fork?
Bill Cox
- [Cryptography] Back door competition for TrueCrypt fork?
tpb-crypto at laposte.net
- [Cryptography] Back door competition for TrueCrypt fork?
Bear
- [Cryptography] Back door competition for TrueCrypt fork?
ianG
- [Cryptography] Back door competition for TrueCrypt fork?
Bill Cox
- [Cryptography] basing conclusions on facts
ianG
- [Cryptography] basing conclusions on facts
Stephen Farrell
- [Cryptography] basing conclusions on facts (was: Re: [cryptography] Dual EC backdoor was patented by Certicom?)
Stephen Farrell
- [Cryptography] Bitcoin compute power
Nemo
- [Cryptography] Bitcoin compute power
grarpamp
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
Perry E. Metzger
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
Phillip Hallam-Baker
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
Lodewijk andré de la porte
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
ianG
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
John Levine
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
Paul Ferguson
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
John Kelsey
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
John Levine
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
Phillip Hallam-Baker
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
Lodewijk andré de la porte
- [Cryptography] Bitcoin compute power (was Re: Aggregate signatures)
Lodewijk andré de la porte
- [Cryptography] bitcoins over the air
Sampo Syreeni
- [Cryptography] Can Google's new "End to End" leak plaintext via the DOM? [was: Re: [liberationtech] Mailvelope: OpenPGP Encryption for Webmail]
StealthMonger
- [Cryptography] Can Google's new "End to End" leak plaintext via the DOM? [was: Re: [liberationtech] Mailvelope: OpenPGP Encryption for Webmail]
Brian M. Waters
- [Cryptography] Cisco FNR; block cipher without padding
TJ
- [Cryptography] Cisco FNR; block cipher without padding
Hugo Landau
- [Cryptography] Cisco FNR; block cipher without padding
Paul Grubbs
- [Cryptography] Code Spaces has been under DDOS attacks and...
Tom Mitchell
- [Cryptography] Code Spaces has been under DDOS attacks and...
ianG
- [Cryptography] Code Spaces has been under DDOS attacks and...
Perry E. Metzger
- [Cryptography] Code Spaces has been under DDOS attacks and...
John Ioannidis
- [Cryptography] Code Spaces has been under DDOS attacks and...
John Levine
- [Cryptography] Crippling Javascript for safer browsing
Jerry Leichter
- [Cryptography] Crippling Javascript for safer browsing
John Ioannidis
- [Cryptography] Crippling Javascript for safer browsing
Jerry Leichter
- [Cryptography] Crippling Javascript for safer browsing
Arnold Reinhold
- [Cryptography] Crippling Javascript for safer browsing
Theodore Ts'o
- [Cryptography] Crippling Javascript for safer browsing
Jerry Leichter
- [Cryptography] Crippling Javascript for safer browsing
Arnold Reinhold
- [Cryptography] Dispelling some myths about Bitcoin, from a Bitcoin fan
lmgoodman at hushmail.com
- [Cryptography] Dispelling some myths about Bitcoin, from a Bitcoin fan
Lodewijk andré de la porte
- [Cryptography] Dispelling some myths about Bitcoin, from a Bitcoin fan
lmgoodman at hushmail.com
- [Cryptography] Dispelling some myths about Bitcoin, from a Bitcoin fan
Bear
- [Cryptography] Dispelling some myths about Bitcoin, from a Bitcoin fan
L. M. Goodman
- [Cryptography] DOJ Wants to Expand Authority to Break Into Suspects' Computers
Jerry Leichter
- [Cryptography] DOJ Wants to Expand Authority to Break Into Suspects' Computers
Jerry Leichter
- [Cryptography] DOJ Wants to Expand Authority to Break Into Suspects' Computers
ianG
- [Cryptography] DOJ Wants to Expand Authority to Break Into Suspects' Computers
John Kelsey
- [Cryptography] DOJ Wants to Expand Authority to Break Into Suspects' Computers
John Ioannidis
- [Cryptography] DOJ Wants to Expand Authority to Break Into Suspects' Computers
dan at geer.org
- [Cryptography] Dual EC backdoor was patented by Certicom?
ianG
- [Cryptography] Dual EC backdoor was patented by Certicom?
Hanno Böck
- [Cryptography] Dual EC backdoor was patented by Certicom?
Tanja Lange
- [Cryptography] Dual EC backdoor was patented by Certicom?
Hanno Böck
- [Cryptography] encrypting hard drives (was Re: Shredding a file on a flash-based file system?)
Perry E. Metzger
- [Cryptography] encrypting hard drives (was Re: Shredding a file on a flash-based file system?)
Dan McDonald
- [Cryptography] encrypting hard drives (was Re: Shredding a file on a flash-based file system?)
lists at notatla.org.uk
- [Cryptography] encrypting hard drives (was Re: Shredding a file on a flash-based file system?)
grarpamp
- [Cryptography] encrypting hard drives (was Re: Shredding a file on a flash-based file system?)
Dan McDonald
- [Cryptography] encrypting hard drives (was Re: Shredding a file on a flash-based file system?)
grarpamp
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Kent Borg
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Jerry Leichter
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Bill Frantz
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Philipp Gühring
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Ben Laurie
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Kent Borg
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Tony Arcieri
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Kent Borg
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Tony Arcieri
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Phillip Hallam-Baker
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Kent Borg
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Jerry Leichter
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Jonathan Katz
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Kent Borg
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Peter Fairbrother
- [Cryptography] End-to-End, One-to-Many, Encryption Question
John McCormac
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Jerry Leichter
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Ben Laurie
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Ben Laurie
- [Cryptography] End-to-End, One-to-Many, Encryption Question
Peter Fairbrother
- [Cryptography] Even when they get it right they get it wrong
Jerry Leichter
- [Cryptography] Even when they get it right they get it wrong
Viktor Dukhovni
- [Cryptography] FalseCrypt (was GeekCrypt)
Bill Cox
- [Cryptography] Fork of TrueCrypt
Bill Cox
- [Cryptography] Fork of TrueCrypt
ianG
- [Cryptography] Fork of TrueCrypt
Bill Cox
- [Cryptography] Fork of TrueCrypt
tpb-crypto at laposte.net
- [Cryptography] Fork of TrueCrypt
Bill Cox
- [Cryptography] Fork of TrueCrypt
ianG
- [Cryptography] Fork of TrueCrypt
Dave Howe
- [Cryptography] Fork of TrueCrypt
Jerry Leichter
- [Cryptography] Fork of TrueCrypt
Bill Cox
- [Cryptography] Fork of TrueCrypt
Sampo Syreeni
- [Cryptography] Fork of TrueCrypt
Dave Howe
- [Cryptography] Fork of TrueCrypt
Niklas Lemcke - 林樂寬
- [Cryptography] Fork of TrueCrypt
Peter Trei
- [Cryptography] from CNBC: "Cybersecurity firm says large hedge fund attacked"
Perry E. Metzger
- [Cryptography] from CNBC: "Cybersecurity firm says large hedge fund attacked"
John Ioannidis
- [Cryptography] from CNBC: "Cybersecurity firm says large hedge fund attacked"
Perry E. Metzger
- [Cryptography] from CNBC: "Cybersecurity firm says large hedge fund attacked"
Jerry Leichter
- [Cryptography] FW: RFC 7253 on The OCB Authenticated-Encryption Algorithm
Jerry Leichter
- [Cryptography] FW: RFC 7253 on The OCB Authenticated-Encryption Algorithm
Dave Horsfall
- [Cryptography] FW: RFC 7253 on The OCB Authenticated-Encryption Algorithm
Richard Outerbridge
- [Cryptography] FW: RFC 7253 on The OCB Authenticated-Encryption Algorithm
Dave Horsfall
- [Cryptography] GeekCrypt: A Secure Fork of TrueCrypt
Bill Cox
- [Cryptography] GeekCrypt: A Secure Fork of TrueCrypt
tpb-crypto at laposte.net
- [Cryptography] GeekCrypt: A Secure Fork of TrueCrypt
Bill Cox
- [Cryptography] GeekCrypt: A Secure Fork of TrueCrypt
Wasabee
- [Cryptography] GeekCrypt: A Secure Fork of TrueCrypt
Niklas Lemcke - 林樂寬
- [Cryptography] GeekCrypt: A Secure Fork of TrueCrypt
Александр
- [Cryptography] GeekCrypt: A Secure Fork of TrueCrypt
Dirk-Willem van Gulik
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Perry E. Metzger
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Alan Braggins
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Phillip Hallam-Baker
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Lodewijk andré de la porte
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
CodesInChaos
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Perry E. Metzger
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
grarpamp
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Perry E. Metzger
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
grarpamp
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Jerry Leichter
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
John Levine
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Jon Callas
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Paul Madore
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Phillip Hallam-Baker
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Nemo
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
John Levine
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Nemo
- [Cryptography] ghash.io hits 50% of the Bitcoin compute power
Phillip Hallam-Baker
- [Cryptography] Good GPG email solution for Windows (NOT Thunderbird)
Bill Cox
- [Cryptography] Good GPG email solution for Windows (NOT Thunderbird)
The Doctor
- [Cryptography] Good GPG email solution for Windows (NOT Thunderbird)
Stuart Longland
- [Cryptography] Good GPG email solution for Windows (NOT Thunderbird)
Brian Gladman
- [Cryptography] Good GPG email solution for Windows (NOT Thunderbird)
Werner Koch
- [Cryptography] Google "End to End"
Tom Mitchell
- [Cryptography] Google "End to End"
Dave Howe
- [Cryptography] Google "End to End"
Brian M. Waters
- [Cryptography] Google "End to End"
Peter Trei
- [Cryptography] Google "End to End"
John Ioannidis
- [Cryptography] Google "End to End"
Harald Koch
- [Cryptography] Google "End to End"
StealthMonger
- [Cryptography] Google "End to End"
Tom Mitchell
- [Cryptography] Google "End to End"
Phillip Hallam-Baker
- [Cryptography] Google "End to End"
John Ioannidis
- [Cryptography] hardware vs software FDE (was Re: Shredding a file on a flash-based file system?)
Perry E. Metzger
- [Cryptography] hardware vs software FDE (was Re: Shredding a file on a flash-based file system?)
Darren Lasko
- [Cryptography] hardware vs software FDE (was Re: Shredding a file on a flash-based file system?)
Perry E. Metzger
- [Cryptography] hardware vs software FDE (was Re: Shredding a file on a flash-based file system?)
Darren Lasko
- [Cryptography] Help investigate cell phone snooping by police nationwide
John Young
- [Cryptography] Help investigate cell phone snooping by police nationwide
Bill Cox
- [Cryptography] Help investigate cell phone snooping by police nationwide
Tom Mitchell
- [Cryptography] Help investigate cell phone snooping by police nationwide
Sidney Markowitz
- [Cryptography] Help investigate cell phone snooping by police nationwide
grarpamp
- [Cryptography] Help investigate cell phone snooping by police nationwide
grarpamp
- [Cryptography] Help investigate cell phone snooping by police nationwide
Jerry Leichter
- [Cryptography] Help investigate cell phone snooping by police nationwide
Peter Gutmann
- [Cryptography] Help investigate cell phone snooping by police nationwide
Natanael
- [Cryptography] Help investigate cell phone snooping by police nationwide
John Young
- [Cryptography] Help investigate cell phone snooping by police nationwide
John Kelsey
- [Cryptography] Help investigate cell phone snooping by police nationwide
Bill Stewart
- [Cryptography] Help investigate cell phone snooping by police nationwide
Tom Mitchell
- [Cryptography] Help please, considering design of personal CA for PPE
Phillip Hallam-Baker
- [Cryptography] Help please, considering design of personal CA for PPE
ianG
- [Cryptography] Help please, considering design of personal CA for PPE
Theodore Ts'o
- [Cryptography] Help please, considering design of personal CA for PPE
Phillip Hallam-Baker
- [Cryptography] Help please, considering design of personal CA for PPE
Guido Witmond
- [Cryptography] Help please, considering design of personal CA for PPE
Phillip Hallam-Baker
- [Cryptography] Help please, considering design of personal CA for PPE
Jerry Leichter
- [Cryptography] Help please, considering design of personal CA for PPE
John Kelsey
- [Cryptography] Help please, considering design of personal CA for PPE
Phillip Hallam-Baker
- [Cryptography] Help please, considering design of personal CA for PPE
ianG
- [Cryptography] How big a speedup through storage?
Perry E. Metzger
- [Cryptography] Implementing constant-time string comparison
sycamoreone
- [Cryptography] Implementing constant-time string comparison
ianG
- [Cryptography] Implementing constant-time string comparison
Steve Weis
- [Cryptography] Implementing constant-time string comparison
Jerry Leichter
- [Cryptography] Implementing constant-time string comparison
sycamoreone
- [Cryptography] Implementing constant-time string comparison
Anton Titov
- [Cryptography] Implementing constant-time string comparison
ianG
- [Cryptography] Implementing constant-time string comparison
Dave Horsfall
- [Cryptography] Implementing constant-time string comparison
John Gilmore
- [Cryptography] Implementing constant-time string comparison
Ben Laurie
- [Cryptography] Implementing constant-time string comparison
sycamoreone
- [Cryptography] Implementing constant-time string comparison
Ben Laurie
- [Cryptography] Interesting new article by Ross Anderson...
Jerry Leichter
- [Cryptography] Interesting new article by Ross Anderson...
Viktor Dukhovni
- [Cryptography] Internet Giants erect barriers to spy agencies
John Young
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Stephan Neuhaus
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
ianG
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Phillip Hallam-Baker
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Natanael
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Nemo
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Ben Laurie
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Bear
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Phillip Hallam-Baker
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Brian M. Waters
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Phillip Hallam-Baker
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Judson Lester
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Judson Lester
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Phillip Hallam-Baker
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Bear
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Phillip Hallam-Baker
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Jerry Leichter
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
ianG
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
John Kelsey
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
John Kelsey
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
tpb-crypto at laposte.net
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Phillip Hallam-Baker
- [Cryptography] Is it mathematically provably impossible to construct a mechanism to test for back doors in programs?
Robert Hettinga
- [Cryptography] It's GnuTls's turn
Grant Schultz
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Jerry Leichter
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Dmitry Belyavsky
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
alan at clueserver.org
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
John Ioannidis
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Salz, Rich
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Kelly J. Rose
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Theodore Ts'o
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Jerry Leichter
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Jerry Leichter
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Theodore Ts'o
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Tom Mitchell
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Salz, Rich
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
ianG
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Phillip Hallam-Baker
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
dan at geer.org
- [Cryptography] It's GnuTLS's turn: "Critical new bug in crypto library leaves Linux, apps open to drive-by attacks"
Adam Sampson
- [Cryptography] Java: The 1990s called, they want their keys back!
Peter Gutmann
- [Cryptography] Java: The 1990s called, they want their keys back!
Sandy Harris
- [Cryptography] Languages, languages
Perry E. Metzger
- [Cryptography] Languages, languages (was Re: Swift and cryptography)
Perry E. Metzger
- [Cryptography] Languages, languages (was Re: Swift and cryptography)
Phillip Hallam-Baker
- [Cryptography] Languages, languages (was Re: Swift and cryptography)
Tom Mitchell
- [Cryptography] Languages, languages (was Re: Swift and cryptography)
Bear
- [Cryptography] Languages, languages (was Re: Swift and cryptography)
Tony Arcieri
- [Cryptography] Languages, languages (was Re: Swift and cryptography)
Tom Mitchell
- [Cryptography] Languages, languages (was Re: Swift and cryptography)
Perry E. Metzger
- [Cryptography] Languages, languages (was Re: Swift and cryptography)
Tony Arcieri
- [Cryptography] Licensing OCB (RFC 7253)
Salz, Rich
- [Cryptography] Licensing OCB (RFC 7253)
Christoph Anton Mitterer
- [Cryptography] Licensing OCB (RFC 7253)
Peter Gutmann
- [Cryptography] Licensing OCB (RFC 7253)
Salz, Rich
- [Cryptography] Licensing OCB (RFC 7253)
Peter Gutmann
- [Cryptography] Licensing OCB (RFC 7253)
John Kelsey
- [Cryptography] More OpenSSL Vulnerabilities Disclosed
Alex Stanford
- [Cryptography] Nominate crypto projects that don't suck
Steve Weis
- [Cryptography] Nominate crypto projects that don't suck
Александр
- [Cryptography] Nominate crypto projects that don't suck
Steve Weis
- [Cryptography] one last thought for today on formal methods...
Perry E. Metzger
- [Cryptography] one last thought for today on formal methods...
ianG
- [Cryptography] one last thought for today on formal methods...
Perry E. Metzger
- [Cryptography] Patents and technology
Robert L. Wilson
- [Cryptography] Preventing proof-of-work outsourcing in bitcoin with Lamport signatures
L. M. Goodman
- [Cryptography] Preventing proof-of-work outsourcing in bitcoin with Lamport signatures
grarpamp
- [Cryptography] Reset The Net day! And LeastAuthority.com update
Zooko Wilcox-OHearn
- [Cryptography] Reset The Net day! And LeastAuthority.com update
Chris Tonkinson
- [Cryptography] Reset The Net day! And LeastAuthority.com update
Bob Simmons
- [Cryptography] Reset The Net day! And LeastAuthority.com update
grarpamp
- [Cryptography] Retrofiting Access Control
Bill Frantz
- [Cryptography] Review: The Code Book, by Simon Singh
Dave Horsfall
- [Cryptography] Review: The Code Book, by Simon Singh
Rob Kendrick
- [Cryptography] Review: The Code Book, by Simon Singh
Dennis E. Hamilton
- [Cryptography] Review of Handbook of Applied Cryptography by Menezes et al
Dave Horsfall
- [Cryptography] Secret "rendezvous" based on telephone numbers
Tobias Markus
- [Cryptography] Secret "rendezvous" based on telephone numbers
Ben Laurie
- [Cryptography] Secret "rendezvous" based on telephone numbers
Tobias Markus
- [Cryptography] seL4 going open source
ianG
- [Cryptography] Shredding a file on a flash-based file system?
Thierry Moreau
- [Cryptography] Shredding a file on a flash-based file system?
John Denker
- [Cryptography] Shredding a file on a flash-based file system?
Perry E. Metzger
- [Cryptography] Shredding a file on a flash-based file system?
Jerry Leichter
- [Cryptography] Shredding a file on a flash-based file system?
Bear
- [Cryptography] Shredding a file on a flash-based file system?
Natanael
- [Cryptography] Shredding a file on a flash-based file system?
Darren Lasko
- [Cryptography] Shredding a file on a flash-based file system?
Bill Frantz
- [Cryptography] Shredding a file on a flash-based file system?
John Gilmore
- [Cryptography] Shredding a file on a flash-based file system?
Joseph Ashwood
- [Cryptography] Shredding a file on a flash-based file system?
Thierry Moreau
- [Cryptography] Shredding a file on a flash-based file system?
Jerry Leichter
- [Cryptography] Shredding a file on a flash-based file system?
Theodore Ts'o
- [Cryptography] Shredding a file on a flash-based file system?
Bear
- [Cryptography] Shredding a file on a flash-based file system?
Perry E. Metzger
- [Cryptography] Shredding a file on a flash-based file system?
Chris Tonkinson
- [Cryptography] Shredding a file on a flash-based file system?
Bear
- [Cryptography] Spaces in web passwords
Dave Horsfall
- [Cryptography] Spaces in web passwords
ianG
- [Cryptography] Spaces in web passwords
Jerry Leichter
- [Cryptography] Spaces in web passwords
John Ioannidis
- [Cryptography] Spaces in web passwords
Chris Tonkinson
- [Cryptography] Spaces in web passwords
Kevin W. Wall
- [Cryptography] Spaces in web passwords
Perry E. Metzger
- [Cryptography] Spaces in web passwords
Perry E. Metzger
- [Cryptography] Spaces in web passwords
Bill Stewart
- [Cryptography] Subject: Re: Swift and cryptography
Arnold Reinhold
- [Cryptography] Subject: Re: Swift and cryptography
Ben Laurie
- [Cryptography] Subject: Re: Swift and cryptography
Nemo
- [Cryptography] Subject: Re: Swift and cryptography
Phillip Hallam-Baker
- [Cryptography] Subject: Re: Swift and cryptography
Arnold Reinhold
- [Cryptography] Subject: Re: Swift and cryptography
Viktor Dukhovni
- [Cryptography] Subject: Re: Swift and cryptography
ianG
- [Cryptography] Swift and cryptography
Arnold Reinhold
- [Cryptography] Swift and cryptography
Phillip Hallam-Baker
- [Cryptography] Swift and cryptography
Perry E. Metzger
- [Cryptography] Swift and cryptography
Tom Mitchell
- [Cryptography] Swift and cryptography
Nemo
- [Cryptography] Swift and cryptography
David Mercer
- [Cryptography] Swift and cryptography
Tony Arcieri
- [Cryptography] Swift and cryptography
Erik de Castro Lopo
- [Cryptography] Swift and cryptography
Jerry Leichter
- [Cryptography] Swift and cryptography
Arnold Reinhold
- [Cryptography] Swift and cryptography
Peter Trei
- [Cryptography] Swift and cryptography
Jerry Leichter
- [Cryptography] Swift and cryptography
Bear
- [Cryptography] Swift and cryptography
Bill Frantz
- [Cryptography] To what is Anderson referring here?
Jerry Leichter
- [Cryptography] To what is Anderson referring here?
Christian Huitema
- [Cryptography] To what is Anderson referring here?
fukami
- [Cryptography] To what is Anderson referring here?
Peter Gutmann
- [Cryptography] To what is Anderson referring here?
Jerry Leichter
- [Cryptography] To what is Anderson referring here?
fukami
- [Cryptography] To what is Anderson referring here?
ianG
- [Cryptography] To what is Anderson referring here?
Kevin W. Wall
- [Cryptography] To what is Anderson referring here?
Jerry Leichter
- [Cryptography] To what is Anderson referring here?
Christian Huitema
- [Cryptography] To what is Anderson referring here?
Alan Braggins
- [Cryptography] To what is Anderson referring here?
Peter Gutmann
- [Cryptography] To what is Anderson referring here?
James A. Donald
- [Cryptography] To what is Anderson referring here?
Salz, Rich
- [Cryptography] To what is Anderson referring here?
ianG
- [Cryptography] To what is Anderson referring here?
ianG
- [Cryptography] To what is Anderson referring here?
ianG
- [Cryptography] To what is Anderson referring here?
ianG
- [Cryptography] To what is Anderson referring here?
Dan McDonald
- [Cryptography] To what is Anderson referring here?
John Levine
- [Cryptography] To what is Anderson referring here?
Peter Gutmann
- [Cryptography] To what is Anderson referring here?
Dan McDonald
- [Cryptography] To what is Anderson referring here?
dan at geer.org
- [Cryptography] To what is Anderson referring here?
Salz, Rich
- [Cryptography] To what is Anderson referring here?
Bill Frantz
- [Cryptography] TrueCrypt forum on CipherShed.org
Bill Cox
- [Cryptography] Two news items on OpenSSL and formal methods
Perry E. Metzger
- [Cryptography] Vote of no confidence.
Bear
- [Cryptography] Vote of no confidence.
Lodewijk andré de la porte
- [Cryptography] Vote of no confidence.
Bill Cox
- [Cryptography] WG Review: TCP Increased Security (tcpinc)
ianG
- [Cryptography] What happened to Crypt Breaker's Workbench?
Dave Horsfall
- [Cryptography] What happened to Crypt Breaker's Workbench?
Jonathan Care
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
Bryan Bishop
- [Cryptography] What has Bitcoin achieved?
Ben Laurie
- [Cryptography] What has Bitcoin achieved?
Bear
- [Cryptography] What has Bitcoin achieved?
Brian M. Waters
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
John Levine
- [Cryptography] What has Bitcoin achieved?
Jerry Leichter
- [Cryptography] What has Bitcoin achieved?
Zooko Wilcox-OHearn
- [Cryptography] What has Bitcoin achieved?
Tom Mitchell
- [Cryptography] What has Bitcoin achieved?
Jerry Leichter
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
Bill Stewart
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
tpb-crypto at laposte.net
- [Cryptography] What has Bitcoin achieved?
John Levine
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
tpb-crypto at laposte.net
- [Cryptography] What has Bitcoin achieved?
John Levine
- [Cryptography] What has Bitcoin achieved?
Bear
- [Cryptography] What has Bitcoin achieved?
Bill Frantz
- [Cryptography] What has Bitcoin achieved?
Bear
- [Cryptography] What has Bitcoin achieved?
tpb-crypto at laposte.net
- [Cryptography] What has Bitcoin achieved?
Bear
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
John Kelsey
- [Cryptography] What has Bitcoin achieved?
James A. Donald
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
Lodewijk andré de la porte
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
Lodewijk andré de la porte
- [Cryptography] What has Bitcoin achieved?
William Muriithi
- [Cryptography] What has Bitcoin achieved?
James A. Donald
- [Cryptography] What has Bitcoin achieved?
James A. Donald
- [Cryptography] What has Bitcoin achieved?
Phillip Hallam-Baker
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
Bear
- [Cryptography] What has Bitcoin achieved?
L. M. Goodman
- [Cryptography] What has Bitcoin achieved?
Bear
- [Cryptography] What has Bitcoin achieved?
John Levine
- [Cryptography] What has Bitcoin achieved?
L. M. Goodman
- [Cryptography] What has Bitcoin achieved?
ianG
- [Cryptography] What has Bitcoin achieved?
Dave Horsfall
- [Cryptography] What has Bitcoin achieved?
John Levine
- [Cryptography] What has Bitcoin achieved?
Jonathan Thornburg
- [Cryptography] What has Bitcoin achieved?
Shrdlu
- [Cryptography] What is going on with TrueCrypt?
Sidney Markowitz
- [Cryptography] What is going on with TrueCrypt?
Phillip Hallam-Baker
- [Cryptography] What is going on with TrueCrypt?
ianG
- [Cryptography] What is going on with TrueCrypt?
Bill Cox
- [Cryptography] What is going on with TrueCrypt?
Sidney Markowitz
- [Cryptography] What is going on with TrueCrypt?
Nemo
- [Cryptography] What is going on with TrueCrypt?
Kelly J. Rose
- [Cryptography] What is going on with TrueCrypt?
Sidney Markowitz
- [Cryptography] What is going on with TrueCrypt?
Roland C. Dowdeswell
- [Cryptography] What is going on with TrueCrypt?
Jerry Leichter
- [Cryptography] What is going on with TrueCrypt?
Salz, Rich
- [Cryptography] What is going on with TrueCrypt?
George Larson
- [Cryptography] What is going on with TrueCrypt?
Sidney Markowitz
- [Cryptography] What is going on with TrueCrypt?
Dave Howe
- [Cryptography] Yet more formal methods news: seL4 to go open source
Perry E. Metzger
- [Cryptography] Yet more formal methods news: seL4 to go open source
Jerry Leichter
- [Cryptography] Yet more formal methods news: seL4 to go open source
Perry E. Metzger
- [Cryptography] Yet more formal methods news: seL4 to go open source
Phillip Hallam-Baker
- [Cryptography] Yet more formal methods news: seL4 to go open source
Perry E. Metzger
- [Cryptography] Yet more formal methods news: seL4 to go open source
Phillip Hallam-Baker
- [Cryptography] Yet more formal methods news: seL4 to go open source
Bear
- [Cryptography] Yet more formal methods news: seL4 to go open source
Bill Frantz
- [Cryptography] Yet more formal methods news: seL4 to go open source
Lodewijk andré de la porte
- [Cryptography] Yet more formal methods news: seL4 to go open source
Perry E. Metzger
- [Cryptography] Yet more formal methods news: seL4 to go open source
Peter Gutmann
Last message date:
Mon Jun 30 18:48:24 EDT 2014
Archived on: Tue Jul 1 06:38:52 EDT 2014
This archive was generated by
Pipermail 0.09 (Mailman edition).