October 2015 Archives by subject
Starting: Thu Oct 1 00:57:52 EDT 2015
Ending: Sat Oct 31 23:57:29 EDT 2015
Messages: 342
- [Cryptography] "Digital" Love Locks?
Henry Baker
- [Cryptography] "Digital" Love Locks?
Natanael
- [Cryptography] "We need crypto code training" and other obviosities.
ianG
- [Cryptography] "We need crypto code training" and other obviosities.
John-Mark Gurney
- [Cryptography] "We need crypto code training" and other obviosities.
Max Kington
- [Cryptography] "We need crypto code training" and other obviosities.
Jean-Philippe Aumasson
- [Cryptography] "We need crypto code training" and other obviosities.
ianG
- [Cryptography] "We need crypto code training" and other obviosities.
Jean-Philippe Aumasson
- [Cryptography] "We need crypto code training" and other obviosities.
Jerry Leichter
- [Cryptography] "We need crypto code training" and other obviosities.
John-Mark Gurney
- [Cryptography] (fwd) a tale of software maintenance: OpenSSL and EVP_CHECK_DES_KEY
ianG
- [Cryptography] (fwd) a tale of software maintenance: OpenSSL and EVP_CHECK_DES_KEY
Ryan Carboni
- [Cryptography] [bart.preneel at esat.kuleuven.be: [fc-announce] Financial Cryptography 2016 - deadline extension until October 11]
R. Hirschfeld
- [Cryptography] [Crypto-practicum] Usable Security Based On Sufficient Endpoint-Specific Unpredictability
Ralf Senderek
- [Cryptography] [Crypto-practicum] Usable Security Based On Sufficient Endpoint-Specific Unpredictability
Ron Garret
- [Cryptography] [FORGED] How programming language design can help us write secure crypto code
Bertrand Mollinier Toublet
- [Cryptography] [FORGED] Re: Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Peter Gutmann
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Peter Gutmann
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Mansour Moufid
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Watson Ladd
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Ray Dillinger
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Mansour Moufid
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Rob Meijer
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Christian Huitema
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Peter Gutmann
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Ray Dillinger
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Jerry Leichter
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Ray Dillinger
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Jerry Leichter
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Peter Gutmann
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Ray Dillinger
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Thierry Moreau
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Peter Gutmann
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Christian Huitema
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Thierry Moreau
- [Cryptography] [FORGED] Re: How programming language design can help us write secure crypto code
Jerry Leichter
- [Cryptography] [FORGED] The Energy Budget for Wireless Security shows cryptography is cheap
Peter Gutmann
- [Cryptography] [FORGED] The Energy Budget for Wireless Security shows cryptography is cheap
ianG
- [Cryptography] [FORGED] The Energy Budget for Wireless Security shows cryptography is cheap
dj at deadhat.com
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Werner Koch
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Peter Gutmann
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Peter Gutmann
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
David Leon Gil
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Werner Koch
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Peter Gutmann
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Werner Koch
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Jon Callas
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Peter Gutmann
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Werner Koch
- [Cryptography] [openpgp] OpenPGP SEIP downgrade attack
Watson Ladd
- [Cryptography] Are zero knowledge authentication systems safe?
Phillip Hallam-Baker
- [Cryptography] A Riddle Wrapped in an Enigma - Elliptic curves, NSA and post quantum cryptography
Joachim Strömbergson
- [Cryptography] Attacking Elliptic Curve Crypto on the infinity symbol
Bill Cox
- [Cryptography] Attacking Elliptic Curve Crypto on the infinity symbol
covariant
- [Cryptography] Attacking Elliptic Curve Crypto on the infinity symbol
Bill Cox
- [Cryptography] attacks on packet length may be surprisingly good: Hookt on fon-iks
ianG
- [Cryptography] Aussie scientists put quantum computing onto silicon
Dave Horsfall
- [Cryptography] Axe Campaigne Oral History
John Young
- [Cryptography] blockchain and trustworthy computing
Natanael
- [Cryptography] blockchain and trustworthy computing
Peter Todd
- [Cryptography] blockchain and trustworthy computing
Bryan Bishop
- [Cryptography] blockchain and trustworthy computing
phm
- [Cryptography] blockchain and trustworthy computing
Peter Todd
- [Cryptography] blockchain and trustworthy computing
ianG
- [Cryptography] blockchain and trustworthy computing
ianG
- [Cryptography] blockchain and trustworthy computing
Lodewijk andré de la porte
- [Cryptography] blockchain and trustworthy computing
Peter Todd
- [Cryptography] blockchain and trustworthy computing
ianG
- [Cryptography] blockchain and trustworthy computing
Ray Dillinger
- [Cryptography] blockchain and trustworthy computing
Peter Todd
- [Cryptography] blockchain and trustworthy computing
Natanael
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Henry Baker
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
ianG
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Philipp Jovanovic
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Scott Elcomb
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Alexandre Anzala-Yamajako
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Jeroen van der Ham
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
ianG
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
arxlight
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Ryan Carboni
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Dave Horsfall
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Jerry Leichter
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Philipp Jovanovic
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Phillip Hallam-Baker
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Bart Preneel
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Hubert A. Le Van Gong
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Henry Baker
- [Cryptography] Collisions w/SHA-1 ~$100,000 TODAY
Peter Gutmann
- [Cryptography] composing EC & RSA encryption?
ianG
- [Cryptography] composing EC & RSA encryption?
Ron Garret
- [Cryptography] composing EC & RSA encryption?
Jerry Leichter
- [Cryptography] composing EC & RSA encryption?
ianG
- [Cryptography] composing EC & RSA encryption?
Tony Arcieri
- [Cryptography] composing EC & RSA encryption?
Bill Cox
- [Cryptography] composing EC & RSA encryption?
Bill Cox
- [Cryptography] composing EC & RSA encryption?
Tony Arcieri
- [Cryptography] composing EC & RSA encryption?
Hanno Böck
- [Cryptography] composing EC & RSA encryption?
Watson Ladd
- [Cryptography] composing EC & RSA encryption?
Tony Arcieri
- [Cryptography] composing EC & RSA encryption?
Ryan Carboni
- [Cryptography] composing EC & RSA encryption?
Lodewijk andré de la porte
- [Cryptography] composing EC & RSA encryption?
ianG
- [Cryptography] composing EC & RSA encryption?
Tony Arcieri
- [Cryptography] composing EC & RSA encryption?
Jerry Leichter
- [Cryptography] composing EC & RSA encryption?
Peter Gutmann
- [Cryptography] composing EC & RSA encryption?
Phillip Hallam-Baker
- [Cryptography] Criptyque touts all-in-one secure comms app
Henry Baker
- [Cryptography] Cryptography's Role in Securing the Information Society, May 2, 1996
John Young
- [Cryptography] cryptography Digest, Vol 30, Issue 25
Nemo
- [Cryptography] Cryptome for sale with access log files from 1996 for $50, 000, 000
John Young
- [Cryptography] Edwards curves are just ellipses - and why ECC works
Bill Cox
- [Cryptography] Edwards curves are just ellipses - and why ECC works
Bill Cox
- [Cryptography] Edwards curves are just ellipses - and why ECC works
Bill Cox
- [Cryptography] Edwards curves are just ellipses - and why ECC works
Peter Fairbrother
- [Cryptography] Edwards curves are just ellipses - and why ECC works
Bill Cox
- [Cryptography] Edwards curves are just ellipses - and why ECC works
Bill Cox
- [Cryptography] Edwards curves are just ellipses - and why ECC works
Bill Cox
- [Cryptography] Edwards curves are just ellipses - and why ECC works
Bill Cox
- [Cryptography] EFF press release: Wednesday Hearing in NSA Spying Case
John Gilmore
- [Cryptography] EFF press release: Wednesday Hearing in NSA Spying Case
James S. Tyre
- [Cryptography] Elliptic Curve Key Sharing
Nathaniel McCallum
- [Cryptography] Elliptic Curve Key Sharing
Phillip Hallam-Baker
- [Cryptography] freedom-to-tinker.com: How is NSA breaking so much crypto?
Louis Kowolowski
- [Cryptography] freedom-to-tinker.com: How is NSA breaking so much crypto?
John-Mark Gurney
- [Cryptography] freedom-to-tinker.com: How is NSA breaking so much crypto?
Louis Kowolowski
- [Cryptography] Future GPG/PGP
Rællic Systems
- [Cryptography] Future GPG/PGP
Miroslav Kratochvil
- [Cryptography] Fwd: Adaptive Echo (AE) Routing & Alibi Routing
Tom A.
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Arnold Reinhold
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Arnold Reinhold
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Dan McDonald
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Peter Gutmann
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Dan McDonald
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Ray Dillinger
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Watson Ladd
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Peter Fairbrother
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
John-Mark Gurney
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Phillip Hallam-Baker
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Peter Gutmann
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Peter Gutmann
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Paul Wouters
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Watson Ladd
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Peter Gutmann
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Natanael
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Phillip Hallam-Baker
- [Cryptography] Fwd: freedom-to-tinker.com: How is NSA breaking so much crypto?
Ryan Carboni
- [Cryptography] Fwd: Other obvious issues being ignored?
Tom Mitchell
- [Cryptography] Happy birthday, Martin Hellman!
Dave Horsfall
- [Cryptography] Hiding parties identities
Christian Huitema
- [Cryptography] Hiding parties identities
Peter Gutmann
- [Cryptography] Hiding parties identities
ryan.pear at ownbay.net
- [Cryptography] Hiding parties identities
Ray Dillinger
- [Cryptography] Hiding parties identities
Christian Huitema
- [Cryptography] Hiding parties identities
Ralf Senderek
- [Cryptography] Hiding parties identities
Ben Laurie
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Rob Meijer
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Ryan Carboni
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Dave Horsfall
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Rob Meijer
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Natanael
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Zooko Wilcox-OHearn
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Natanael
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Tom Mitchell
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Ray Dillinger
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Zooko Wilcox-OHearn
- [Cryptography] How does the size of a set of target results influence the complexity of a preimage attack?
Ray Dillinger
- [Cryptography] How programming language design can help us write secure crypto code
Ray Dillinger
- [Cryptography] How programming language design can help us write secure crypto code
Bertrand Mollinier Toublet
- [Cryptography] How programming language design can help us write secure crypto code
Michael Kjörling
- [Cryptography] How programming language design can help us write secure crypto code
Henry Baker
- [Cryptography] How programming language design can help us write secure crypto code (was: Re: Other obvious issues being ignored?)
Michael Kjörling
- [Cryptography] Hyper-V claims to protect tenant secrets ??
Henry Baker
- [Cryptography] Hyper-V claims to protect tenant secrets ??
Jerry Leichter
- [Cryptography] Hyper-V claims to protect tenant secrets ??
Henry Baker
- [Cryptography] Hyper-V claims to protect tenant secrets ??
Jerry Leichter
- [Cryptography] Hyper-V claims to protect tenant secrets ??
Ray Dillinger
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Tony Arcieri
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Phillip Hallam-Baker
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
John Levine
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Tony Arcieri
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Ron Garret
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Tom Mitchell
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Phillip Hallam-Baker
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
John Levine
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Phillip Hallam-Baker
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Jerry Leichter
- [Cryptography] Interesting discussion over on oss-security re: primes
Dave Horsfall
- [Cryptography] Known Hardware (was Other obvious issues being ignored?)
Thierry Moreau
- [Cryptography] letter versus spirit of the law ...
Arnold Reinhold
- [Cryptography] letter versus spirit of the law ... Eventus incertus delendus est
John Denker
- [Cryptography] letter versus spirit of the law ... Eventus incertus delendus est
Peter Gutmann
- [Cryptography] letter versus spirit of the law ... Eventus incertus delendus est
Bill Frantz
- [Cryptography] letter versus spirit of the law ... Eventus incertus delendus est
Michael Kjörling
- [Cryptography] letter versus spirit of the law ... Eventus incertus delendus est
Jerry Leichter
- [Cryptography] letter versus spirit of the law ... Eventus incertus delendus est
Peter Todd
- [Cryptography] letter versus spirit of the law ... UB delenda est
John Denker
- [Cryptography] letter versus spirit of the law ... UB delenda est
Jerry Leichter
- [Cryptography] letter versus spirit of the law ... UB delenda est
Jerry Leichter
- [Cryptography] letter versus spirit of the law ... UB delenda est
Peter Gutmann
- [Cryptography] letter versus spirit of the law ... UB delenda est
Jerry Leichter
- [Cryptography] letter versus spirit of the law ... UB delenda est
D. Hugh Redelmeier
- [Cryptography] letter versus spirit of the law ... UB delenda est
Ron Garret
- [Cryptography] Making secure devices.
Ray Dillinger
- [Cryptography] Making secure devices.
Peter Todd
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Rob Schneier
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Rob Schneier
- [Cryptography] multicollision resistance in protocol design?
Ray Dillinger
- [Cryptography] multicollision resistance in protocol design?
Ron Garret
- [Cryptography] New email feature: NSA speedbumps
Henry Baker
- [Cryptography] NSA Releases 21 Oral History Interviews
John Young
- [Cryptography] NSA Releases 21 Oral History Interviews
Rick Smith, Cryptosmith
- [Cryptography] NSA Releases 21 Oral History Interviews
Charles Jackson
- [Cryptography] of possible interest to list members in the Boston area
R. Hirschfeld
- [Cryptography] OpenPGP SEIP downgrade attack
Jonas Magazinius
- [Cryptography] Oracle archeologists discover memory tagging
Henry Baker
- [Cryptography] Oracle archeologists discover memory tagging
John Gilmore
- [Cryptography] Oracle archeologists discover memory tagging
Henry Baker
- [Cryptography] Other obvious issues being ignored?
Thierry Moreau
- [Cryptography] Other obvious issues being ignored?
Henry Baker
- [Cryptography] Other obvious issues being ignored?
Joshua Hill
- [Cryptography] Other obvious issues being ignored?
Watson Ladd
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Jerry Leichter
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Watson Ladd
- [Cryptography] Other obvious issues being ignored?
Ralf Senderek
- [Cryptography] Other obvious issues being ignored?
Joshua Hill
- [Cryptography] Other obvious issues being ignored?
John Denker
- [Cryptography] Other obvious issues being ignored?
Arnold Reinhold
- [Cryptography] Other obvious issues being ignored?
John Denker
- [Cryptography] Other obvious issues being ignored?
John Denker
- [Cryptography] Other obvious issues being ignored?
Ron Garret
- [Cryptography] Other obvious issues being ignored?
Natanael
- [Cryptography] Other obvious issues being ignored?
John Denker
- [Cryptography] Other obvious issues being ignored?
John Denker
- [Cryptography] Other obvious issues being ignored?
John-Mark Gurney
- [Cryptography] Other obvious issues being ignored?
Jerry Leichter
- [Cryptography] Other obvious issues being ignored?
Ralf Senderek
- [Cryptography] Other obvious issues being ignored?
Jerry Leichter
- [Cryptography] Other obvious issues being ignored?
Arnold Reinhold
- [Cryptography] Other obvious issues being ignored?
Michael Kjörling
- [Cryptography] Other obvious issues being ignored?
John Denker
- [Cryptography] Other obvious issues being ignored?
Bill Frantz
- [Cryptography] Other obvious issues being ignored?
ianG
- [Cryptography] Other obvious issues being ignored?
John Denker
- [Cryptography] Other obvious issues being ignored?
John-Mark Gurney
- [Cryptography] Other obvious issues being ignored?
John-Mark Gurney
- [Cryptography] Other obvious issues being ignored?
Bill Frantz
- [Cryptography] Other obvious issues being ignored?
Ray Dillinger
- [Cryptography] Other obvious issues being ignored?
Ray Dillinger
- [Cryptography] Other obvious issues being ignored?
Ron Garret
- [Cryptography] Other obvious issues being ignored?
Ray Dillinger
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Ray Dillinger
- [Cryptography] Other obvious issues being ignored?
John Gilmore
- [Cryptography] Other obvious issues being ignored?
Peter Fairbrother
- [Cryptography] Other obvious issues being ignored?
Ray Dillinger
- [Cryptography] Other obvious issues being ignored?
Henry Baker
- [Cryptography] Other obvious issues being ignored?
Philipp Gühring
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Jerry Leichter
- [Cryptography] Other obvious issues being ignored?
Jerry Leichter
- [Cryptography] Other obvious issues being ignored?
Watson Ladd
- [Cryptography] Other obvious issues being ignored?
Werner Koch
- [Cryptography] Other obvious issues being ignored?
ianG
- [Cryptography] Other obvious issues being ignored?
John-Mark Gurney
- [Cryptography] Other obvious issues being ignored?
John-Mark Gurney
- [Cryptography] Other obvious issues being ignored?
Ray Dillinger
- [Cryptography] Other obvious issues being ignored?
Tom Mitchell
- [Cryptography] Other obvious issues being ignored?
dan at geer.org
- [Cryptography] Other obvious issues being ignored?
Jerry Leichter
- [Cryptography] Other obvious issues being ignored?
Jerry Leichter
- [Cryptography] Other obvious issues being ignored?
ianG
- [Cryptography] Other obvious issues being ignored?
Peter Gutmann
- [Cryptography] Other obvious issues being ignored?
Thierry Moreau
- [Cryptography] Other obvious issues being ignored?
Ray Dillinger
- [Cryptography] Other obvious issues being ignored?
Yann Droneaud
- [Cryptography] Other obvious issues being ignored?
Arnold Reinhold
- [Cryptography] Other obvious issues being ignored?
Viktor Dukhovni
- [Cryptography] Other obvious issues being ignored?
Watson Ladd
- [Cryptography] Paper check security
Arnold Reinhold
- [Cryptography] Paper check security
Tom Mitchell
- [Cryptography] Paper check security
John Levine
- [Cryptography] Paper check security
Arnold Reinhold
- [Cryptography] Paper check security
John Levine
- [Cryptography] Paper check security
Peter Gutmann
- [Cryptography] Paper check security
Jerry Leichter
- [Cryptography] Paper check security
Tom Mitchell
- [Cryptography] Paper check security
John Levine
- [Cryptography] Paper check security
Dave Horsfall
- [Cryptography] Paper check security
Brian Gladman
- [Cryptography] Paper check security
Jerry Leichter
- [Cryptography] Paper check security
Arnold Reinhold
- [Cryptography] Paper check security
Thierry Moreau
- [Cryptography] Paper check security
Arnold Reinhold
- [Cryptography] Paper check security
Bill Stewart
- [Cryptography] portable, reliable code ... Eventus incertus delendus est
John Denker
- [Cryptography] portable, reliable code ... Eventus incertus delendus est
Ray Dillinger
- [Cryptography] Publicly affirm your support for strong encryption
Henry Baker
- [Cryptography] Randomness for crypto, github repositories
Sandy Harris
- [Cryptography] Randomness for crypto, github repositories
Sandy Harris
- [Cryptography] Recovering x from y on Ed448
Nathaniel McCallum
- [Cryptography] Reproducible results
Robert L. Wilson
- [Cryptography] Reproducible results
Gary Mulder
- [Cryptography] Reproducible results, scientific method, fraud enforcement, etc.
John Denker
- [Cryptography] Reproducible results, scientific method, fraud enforcement, etc.
Jerry Leichter
- [Cryptography] Reproducible results, scientific method, fraud enforcement, etc.
ianG
- [Cryptography] Reproducible results, scientific method, fraud enforcement, etc.
Phillip Hallam-Baker
- [Cryptography] RFID Protocols
Ryan Carboni
- [Cryptography] RFID Protocols
Darkpassenger
- [Cryptography] RFID Protocols
Bill Stewart
- [Cryptography] RFID Protocols
John Denker
- [Cryptography] RIP Tommy Flowers
Dave Horsfall
- [Cryptography] RIP Tommy Flowers
D. Hugh Redelmeier
- [Cryptography] RIP Tommy Flowers
John Levine
- [Cryptography] Security Standard for Safety Critical Software
Adrian McCullagh
- [Cryptography] Security Standard for Safety Critical Software
Darkpassenger
- [Cryptography] Security Standard for Safety Critical Software
Adrian McCullagh
- [Cryptography] Security Standard for Safety Critical Software
ianG
- [Cryptography] Spec for SSLv1
Phillip Hallam-Baker
- [Cryptography] Spec for SSLv1
Phillip Hallam-Baker
- [Cryptography] Spec for SSLv1
ianG
- [Cryptography] Spec for SSLv1
Phillip Hallam-Baker
- [Cryptography] The Energy Budget for Wireless Security shows cryptography is cheap
Ryan Carboni
- [Cryptography] Turing Bombes Enigma
Henry Baker
- [Cryptography] Turing Bombes Enigma
Darkpassenger
- [Cryptography] Usable Security Based On Sufficient Endpoint-Specific Unpredictability
Ralf Senderek
- [Cryptography] Usable Security Based On Sufficient Endpoint-Specific Unpredictability
Natanael
- [Cryptography] Usable Security Based On Sufficient Endpoint-Specific Unpredictability
Ray Dillinger
- [Cryptography] Usable Security Based On Sufficient Endpoint-Specific Unpredictability
Ralf Senderek
- [Cryptography] Usable Security Based On Sufficient Endpoint-Specific Unpredictability
Ralf Senderek
- [Cryptography] WhatApp metadata broken; on deck: voice encryption
Henry Baker
- [Cryptography] Why is ECC secure?
Bill Cox
- [Cryptography] Why is ECC secure?
Bill Cox
- [Cryptography] WikiLeaks Hosts Cryptome with Search
John Young
- [Cryptography] WikiLeaks is not hosting Cryptome, search service only
John Young
- [Cryptography] WikiLeaks of "spying related" to its Cryptome search is click bait
John Young
- [Cryptography] WikiLeaks of "spying related" to its Cryptome search is click bait
phm
Last message date:
Sat Oct 31 23:57:29 EDT 2015
Archived on: Sun Nov 1 00:00:10 EDT 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).