September 2015 Archives by subject
Starting: Tue Sep 1 02:16:29 EDT 2015
Ending: Wed Sep 30 23:22:10 EDT 2015
Messages: 253
- [Cryptography] "Ulysses pacts": better than "warrant canaries" ?
Henry Baker
- [Cryptography] "Ulysses pacts": better than "warrant canaries" ?
Jerry Leichter
- [Cryptography] "Ulysses pacts": better than "warrant canaries" ?
Peter Fairbrother
- [Cryptography] [cryptography] JYA and Cryptome Keys Compromised
Paul Wouters
- [Cryptography] [cryptography] JYA and Cryptome Keys Compromised
John Young
- [Cryptography] [FORGED] Brainpool Curves Found to Be Suspicious
Peter Gutmann
- [Cryptography] [FORGED] Brainpool Curves Found to Be Suspicious
Tony Arcieri
- [Cryptography] [FORGED] Feedback welcome on autentication/password replacement idea
Peter Gutmann
- [Cryptography] [FORGED] Re: millions of Ashley Madison bcrypt hashes cracked efficiently
Peter Gutmann
- [Cryptography] [FORGED] Re: millions of Ashley Madison bcrypt hashes cracked efficiently
Phillip Hallam-Baker
- [Cryptography] [FORGED] Re: millions of Ashley Madison bcrypt hashes cracked efficiently
Ray Dillinger
- [Cryptography] [FORGED] Re: millions of Ashley Madison bcrypt hashes cracked efficiently
Phillip Hallam-Baker
- [Cryptography] [FORGED] Re: NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Peter Gutmann
- [Cryptography] [FORGED] Re: NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Erik Granger
- [Cryptography] [FORGED] Re: NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Steve Weis
- [Cryptography] [FORGED] Re: VW/EPA tests as crypto protocols ?
Peter Gutmann
- [Cryptography] [jensg at ist.psu.edu: [fc-announce] FC 2016 - Call for Papers + Announcements]
R. Hirschfeld
- [Cryptography] ADMIN: Rules for posting to the Cryptography List
Tamzen Cannoy
- [Cryptography] ADMIN Re: VW/EPA tests as crypto protocols ?
Tamzen Cannoy
- [Cryptography] An observation on a Skipjack-style Feistel network
Ryan Carboni
- [Cryptography] An Open Source Analysis of NSA Cryptologic Capabilities
Ryan Carboni
- [Cryptography] An Open Source Analysis of NSA Cryptologic Capabilities
Salz, Rich
- [Cryptography] An Open Source Analysis of NSA Cryptologic Capabilities
Dave Howe
- [Cryptography] An Open Source Analysis of NSA Cryptologic Capabilities
Ray Dillinger
- [Cryptography] Apple?s iMessage Defense Against Spying Has One Flaw
John-Mark Gurney
- [Cryptography] Apple?s iMessage Defense Against Spying Has One Flaw
Jerry Leichter
- [Cryptography] Apple?s iMessage Defense Against Spying Has One Flaw
John-Mark Gurney
- [Cryptography] Apples iMessage Defense Against Spying Has One Flaw
Jerry Leichter
- [Cryptography] Apple’s iMessage Defense Against Spying Has One Flaw
Tony Arcieri
- [Cryptography] Apple’s iMessage Defense Against Spying Has One Flaw
Allen
- Apple�s iMessage Defense Against Spying Has One Flaw
Henry Baker
- [Cryptography] Apple�s iMessage Defense Against Spying Has One Flaw
Ryan Carboni
- [Cryptography] Apple�s iMessage Defense Against Spying Has One Flaw
Allen Schaaf
- [Cryptography] blockchain and trustworthy computing
ianG
- [Cryptography] Brainpool Curves Found to Be Suspicious
Ryan Carboni
- [Cryptography] Checking for the inadvertent use of test keys
Peter Gutmann
- [Cryptography] Checking for the inadvertent use of test keys
John Denker
- [Cryptography] Checking for the inadvertent use of test keys
Ray Dillinger
- [Cryptography] Checking for the inadvertent use of test keys
Guus Sliepen
- [Cryptography] Checking for the inadvertent use of test keys
Tom Mitchell
- [Cryptography] Checking for the inadvertent use of test keys
Peter Gutmann
- [Cryptography] Checking for the inadvertent use of test keys
EddyHawk
- [Cryptography] Checking for the inadvertent use of test keys
Christian Huitema
- [Cryptography] Checking for the inadvertent use of test keys
Ray Dillinger
- [Cryptography] Checking for the inadvertent use of test keys
Tom Mitchell
- [Cryptography] Checking for the inadvertent use of test keys
Tom Mitchell
- [Cryptography] Checking for the inadvertent use of test keys
Philip Gladstone
- [Cryptography] Checking for the inadvertent use of test keys
ianG
- [Cryptography] Comey: targeted ads => plaintext access
Henry Baker
- [Cryptography] Comey: targeted ads => plaintext access
Jerry Leichter
- [Cryptography] Comey: targeted ads => plaintext access
Peter Fairbrother
- [Cryptography] Comey: targeted ads => plaintext access
Phillip Hallam-Baker
- [Cryptography] Comey: targeted ads => plaintext access
Benjamin Kreuter
- [Cryptography] Comey: targeted ads => plaintext access
Benjamin Kreuter
- [Cryptography] Comey: targeted ads => plaintext access
Henry Baker
- [Cryptography] Comey: targeted ads => plaintext access
Ray Dillinger
- [Cryptography] Comey: targeted ads => plaintext access
Jerry Leichter
- [Cryptography] Comey: targeted ads => plaintext access
Tom Mitchell
- [Cryptography] Comey: targeted ads => plaintext access
Tom Mitchell
- [Cryptography] Comey: targeted ads => plaintext access
Ray Dillinger
- [Cryptography] Comey: targeted ads => plaintext access
Henry Baker
- [Cryptography] Comey: targeted ads => plaintext access
Natanael
- [Cryptography] Comey: targeted ads => plaintext access
Devin Reade
- [Cryptography] Comey: targeted ads => plaintext access
Devin Reade
- [Cryptography] Comey: targeted ads => plaintext access
Florian Weimer
- [Cryptography] Comey: targeted ads => plaintext access
Tony Arcieri
- [Cryptography] Comey: targeted ads => plaintext access
Benjamin Kreuter
- [Cryptography] Comey: targeted ads => plaintext access
Henry Baker
- [Cryptography] Comey: targeted ads => plaintext access
Henry Baker
- [Cryptography] Comey: targeted ads => plaintext access
Bill Frantz
- [Cryptography] Comey: targeted ads => plaintext access
Florian Weimer
- [Cryptography] Comey: targeted ads => plaintext access
Bill Frantz
- [Cryptography] Comey: targeted ads => plaintext access
Christian Huitema
- [Cryptography] Curious about FIDO Alliance authentication scheme
Thierry Moreau
- [Cryptography] Cycles overhead for TLS
Ryan Carboni
- [Cryptography] Cycles overhead for TLS
Bill Cox
- [Cryptography] Cycles overhead for TLS
Darkpassenger
- [Cryptography] Cycles overhead for TLS
Salz, Rich
- [Cryptography] Cycles overhead for TLS
Ryan Carboni
- [Cryptography] Cycles overhead for TLS
Salz, Rich
- [Cryptography] Cycles overhead for TLS
Ryan Carboni
- [Cryptography] Elgamal Variant
Nathaniel McCallum
- [Cryptography] Elgamal Variant
Nathaniel McCallum
- [Cryptography] Elgamal Variant
Nathaniel McCallum
- [Cryptography] FBI: Weaker Encryption Is a Worthwhile Tradeoff for Law Enforcement Access to Data
Henry Baker
- [Cryptography] FBI: Weaker Encryption Is a Worthwhile Tradeoff for Law Enforcement Access to Data
Dave Howe
- [Cryptography] FBI: Weaker Encryption Is a Worthwhile Tradeoff for Law Enforcement Access to Data
Henry Baker
- [Cryptography] FBI: Weaker Encryption Is a Worthwhile Tradeoff for Law Enforcement Access to Data
Bill Frantz
- [Cryptography] Feedback welcome on an idea
Grant Schultz
- [Cryptography] Feedback welcome on an idea
ianG
- [Cryptography] Feedback welcome on an idea
Grant Schultz
- [Cryptography] Feedback welcome on an idea
Ben Laurie
- [Cryptography] Feedback welcome on an idea
Grant Schultz
- [Cryptography] Feedback welcome on an idea
Ángel González
- [Cryptography] Feedback welcome on autentication/password replacement idea
Ilya Kasnacheev
- [Cryptography] Feedback welcome on autentication/password replacement idea
Jerry Leichter
- [Cryptography] Feedback welcome on autentication/password replacement idea
Christian Huitema
- [Cryptography] Feedback welcome on autentication/password replacement idea
Howard Chu
- [Cryptography] Feedback welcome on autentication/password replacement idea
Howard Chu
- [Cryptography] Follow up on my password replacement idea
Ilya Kasnacheev
- [Cryptography] Follow up on my password replacement idea
Bill Cox
- [Cryptography] Follow up on my password replacement idea
Phillip Hallam-Baker
- [Cryptography] Follow up on my password replacement idea
Ilya Kasnacheev
- [Cryptography] Follow up on my password replacement idea
Bill Cox
- [Cryptography] Follow up on my password replacement idea
Phillip Hallam-Baker
- [Cryptography] Follow up on my password replacement idea
Bill Cox
- [Cryptography] Follow up on my password replacement idea
Phillip Hallam-Baker
- [Cryptography] Follow up on my password replacement idea
Ray Dillinger
- [Cryptography] Follow up on my password replacement idea
Phillip Hallam-Baker
- [Cryptography] Follow up on my password replacement idea
Ray Dillinger
- [Cryptography] Follow up on my password replacement idea
Jonathan Thornburg
- [Cryptography] Follow up on my password replacement idea
Bill Frantz
- [Cryptography] Follow up on my password replacement idea
Ray Dillinger
- [Cryptography] Follow up on my password replacement idea
Bill Frantz
- [Cryptography] Follow up on my password replacement idea
Ilya Kasnacheev
- [Cryptography] Future GPG/PGP
phm
- [Cryptography] Future GPG/PGP
Paul Wouters
- [Cryptography] Future GPG/PGP
Ron Garret
- [Cryptography] Future GPG/PGP
Ralf Senderek
- [Cryptography] Future GPG/PGP
Michael Kjörling
- [Cryptography] Future GPG/PGP
Allen
- [Cryptography] Future GPG/PGP
Nicolai
- [Cryptography] Future GPG/PGP
Ron Garret
- [Cryptography] Future GPG/PGP
Ron Garret
- [Cryptography] Future GPG/PGP
Werner Koch
- [Cryptography] Future GPG/PGP
phm
- [Cryptography] Future GPG/PGP
Ray Dillinger
- [Cryptography] GCHQ Cryptome surveillance
Henry Baker
- [Cryptography] Google AdSense vuln de-obfuscates ad links for click fraud
Henry Baker
- [Cryptography] Happy birthday, James Ellis!
Dave Horsfall
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Henry Baker
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Fearghas McKay
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Watson Ladd
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
John Levine
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Paul Ferguson
- [Cryptography] Insecure Chip 'n' PIN starts tomorrow
Allen
- [Cryptography] Introducing the phone-directory certificate
Peter Gutmann
- [Cryptography] Introducing the phone-directory certificate
Viktor Dukhovni
- [Cryptography] Introducing the phone-directory certificate
Cat Okita
- [Cryptography] Introducing the phone-directory certificate
Salz, Rich
- [Cryptography] Introducing the phone-directory certificate
Ryan Carboni
- [Cryptography] Introducing the phone-directory certificate
Watson Ladd
- [Cryptography] JYA and Cryptome Keys Compromised
John Young
- [Cryptography] JYA and Cryptome Keys Compromised
Nicholas Cole
- [Cryptography] JYA and Cryptome Passphrase Are Secure
John Young
- [Cryptography] Key Compromise Related to Architectural Work Not Cryptome
John Young
- [Cryptography] Let's Encrypt: Hello World!
Jeroen van der Ham
- [Cryptography] Let's Encrypt: Hello World!
Salz, Rich
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Henry Baker
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Tony Arcieri
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Joachim Strömbergson
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Ray Dillinger
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Phillip Hallam-Baker
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Ray Dillinger
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Peter Gutmann
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Rob S.
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Tony Arcieri
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Salz, Rich
- [Cryptography] Microsoft's new, free, crypto library dubbed FourQ
Phillip Hallam-Baker
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Henry Baker
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Tony Arcieri
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Ray Dillinger
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Tom Mitchell
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Phillip Hallam-Baker
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Ray Dillinger
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
John Kelsey
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Tom Mitchell
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Bill Frantz
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Paul Ferguson
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Allen
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Salz, Rich
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Bill Frantz
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Ryan Carboni
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Ray Dillinger
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
ianG
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Bill Frantz
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Kevin W. Wall
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
WebDawg
- [Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
arxlight
- [Cryptography] mode of operation for file encryption
matic at nimp.co.uk
- [Cryptography] mode of operation for file encryption
Steve Weis
- [Cryptography] mode of operation for file encryption
Jon Callas
- [Cryptography] mode of operation for file encryption
Steve Weis
- [Cryptography] mode of operation for file encryption
sebastien riou
- [Cryptography] mode of operation for file encryption
sebastien riou
- [Cryptography] Non-Authenticated Key Agreement
Davy Durham
- [Cryptography] Non-Authenticated Key Agreement
Guus Sliepen
- [Cryptography] Non-Authenticated Key Agreement
Natanael
- [Cryptography] Non-Authenticated Key Agreement
Bill Cox
- [Cryptography] Non-Authenticated Key Agreement
Ron Garret
- [Cryptography] Non-Authenticated Key Agreement
Philipp Gühring
- [Cryptography] Non-Authenticated Key Agreement
Kristian Gjøsteen
- [Cryptography] Non-Authenticated Key Agreement
Davy Durham
- [Cryptography] Non-Authenticated Key Agreement
Bill Cox
- [Cryptography] NSA/GCHQ put their heads together to discuss encryption on the net
root
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Ryan Carboni
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
ianG
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
ianG
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Steve Weis
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
ianG
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Peter Gutmann
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Jon Callas
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Stephen Farrell
- [Cryptography] NSA looking for quantum-computing resistant encryption. How will encryption be affected by quantum computing
Ryan Carboni
- [Cryptography] Python Rumpelstiltskin-tree library + demo tool
Rob Meijer
- [Cryptography] Ratcheting
Tony Arcieri
- [Cryptography] Ratcheting
Brendan Farmer
- [Cryptography] rejecting 3rd party web accesses/cookies
John Gilmore
- [Cryptography] sibyl attacks
Henry Baker
- [Cryptography] Sixteen chars crashes chrome....
Tom Mitchell
- [Cryptography] Sixteen chars crashes chrome....
Bill Frantz
- [Cryptography] SRP for mutual authentication - as an alternative / addition to certificates?
Ben Laurie
- [Cryptography] The default password of '1234'
Dave Horsfall
- [Cryptography] The default password of '1234'
Peter Gutmann
- [Cryptography] The default password of '1234'
ianG
- [Cryptography] The default password of '1234'
Paul Madore
- [Cryptography] The default password of '1234'
ianG
- [Cryptography] TRR: Anonymization Technology for Bitcoin
Henry Baker
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Florian Weimer
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Henry Baker
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Phillip Hallam-Baker
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Ralf Senderek
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Phillip Hallam-Baker
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Florian Weimer
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Florian Weimer
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Ralf Senderek
- [Cryptography] Vulnerability of RSA vs. DLP to single-bit faults
Florian Weimer
- [Cryptography] VW/EPA tests as crypto protocols ?
Henry Baker
- [Cryptography] VW/EPA tests as crypto protocols ?
Phillip Hallam-Baker
- [Cryptography] VW/EPA tests as crypto protocols ?
Aram Perez
- [Cryptography] VW/EPA tests as crypto protocols ?
Chris Tonkinson
- [Cryptography] VW/EPA tests as crypto protocols ?
John Denker
- [Cryptography] VW/EPA tests as crypto protocols ?
Henry Baker
- [Cryptography] VW/EPA tests as crypto protocols ?
Jerry Leichter
- [Cryptography] VW/EPA tests as crypto protocols ?
Peter Gutmann
- [Cryptography] VW/EPA tests as crypto protocols ?
dj at deadhat.com
- [Cryptography] VW/EPA tests as crypto protocols ?
John-Mark Gurney
- [Cryptography] VW/EPA tests as crypto protocols ?
Tom Mitchell
- [Cryptography] VW/EPA tests as crypto protocols ?
Jerry Leichter
- [Cryptography] VW/EPA tests as crypto protocols ?
Tom Mitchell
- [Cryptography] WashPo: Leaked NSC Memo on Encryption
Henry Baker
- [Cryptography] WashPo: Leaked NSC Memo on Encryption
Henry Baker
- [Cryptography] WashPo: Leaked NSC Memo on Encryption
Ryan Carboni
- [Cryptography] WashPo: Leaked NSC Memo on Encryption
Henry Baker
- [Cryptography] WashPo: Obama admin backdoor proposals
Henry Baker
- [Cryptography] Why is ECC secure?
Bill Cox
- [Cryptography] Why is ECC secure?
Viktor Dukhovni
- [Cryptography] Wrongware: was VW/EPA tests as crypto protocols ?
Ray Dillinger
- [Cryptography] Wrongware: was VW/EPA tests as crypto protocols ?
Natanael
- [Cryptography] Wrongware: was VW/EPA tests as crypto protocols ?
Tom Mitchell
- [Cryptography] Yet another dumb crypto system
Bill Cox
- [Cryptography] Yet another dumb crypto system
Viktor Dukhovni
- [Cryptography] Yet another dumb crypto system
Viktor Dukhovni
Last message date:
Wed Sep 30 23:22:10 EDT 2015
Archived on: Wed Sep 30 23:37:56 EDT 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).