August 2016 Archives by date
      
      Starting: Thu Aug  4 08:22:08 EDT 2016
         Ending: Wed Aug 31 16:34:26 EDT 2016
         Messages: 280
     
- [Cryptography] ChaCha20 DRNG
 
Stephan Mueller
- [Cryptography] ChaCha20 DRNG
 
Jason Cooper
- [Cryptography] ChaCha20 DRNG
 
Stephan Mueller
- [Cryptography] ChaCha20 DRNG
 
Patrick
- [Cryptography] Service-to-Service Object Integrity
 
Jomama
- [Cryptography] ChaCha20 DRNG
 
Stephan Mueller
- [Cryptography] ChaCha20 DRNG
 
Jason Cooper
- [Cryptography] ChaCha20 DRNG
 
Jason Cooper
- [Cryptography] [patch chacha20_drng 0/4] Small cleanups for	chacha20_drng
 
Jason Cooper
- [Cryptography] [patch chacha20_drng 1/4] Add .gitignore file
 
Jason Cooper
- [Cryptography] [patch chacha20_drng 2/4] doc: Update license block	to match source code
 
Jason Cooper
- [Cryptography] [patch chacha20_drng 3/4] API: Remove version macros
 
Jason Cooper
- [Cryptography] [patch chacha20_drng 4/4] API: Make _versionstring	return snprintf() errors
 
Jason Cooper
- [Cryptography] Generating random values in a particular range
 
Jerry Leichter
- [Cryptography] Generating random values in a particular range
 
Sidney Markowitz
- [Cryptography] [patch chacha20_drng 0/4] Small cleanups for	chacha20_drng
 
Stephan Mueller
- [Cryptography] Generating random values in a particular range
 
Kent Borg
- [Cryptography] Generating random values in a particular range
 
John Levine
- [Cryptography] Generating random values in a particular range
 
Sidney Markowitz
- [Cryptography] Generating random values in a particular range
 
Sidney Markowitz
- [Cryptography] Generating random values in a particular range
 
dj at deadhat.com
- [Cryptography] Generating random values in a particular range
 
Ray Dillinger
- [Cryptography] Generating random values in a particular range
 
Watson Ladd
- [Cryptography] Where to Find PQC Crypto Libraries?
 
Lucky Green
- [Cryptography] Generating random values in a particular range
 
Sidney Markowitz
- [Cryptography] Generating random values in a particular range
 
Peter Gutmann
- [Cryptography] Where to Find PQC Crypto Libraries?
 
Jeff Burdges
- [Cryptography] Generating random values in a particular range
 
Ray Dillinger
- [Cryptography] Generating random values in a particular range
 
dj at deadhat.com
- [Cryptography] Where to Find PQC Crypto Libraries?
 
Philipp Gühring
- [Cryptography] Where to Find PQC Crypto Libraries?
 
Ray Dillinger
- [Cryptography] BBC to deploy detection vans to snoop on internet	users
 
Henry Baker
- [Cryptography] Where to Find PQC Crypto Libraries?
 
Jeff Burdges
- [Cryptography] Generating random values in a particular 	range
 
Arnold Reinhold
- [Cryptography] [patch chacha20_drng 0/4] Small cleanups for chacha20_drng
 
Jason Cooper
- [Cryptography] BBC to deploy detection vans to snoop on	internet users
 
Jerry Leichter
- [Cryptography] BBC to deploy detection vans to snoop on [I]nternet users
 
Dave Horsfall
- [Cryptography] BBC to deploy detection vans to snoop on	internet users
 
John Ioannidis
- [Cryptography] BBC to deploy detection vans to snoop on	internet users
 
Tom Mitchell
- [Cryptography] BBC to deploy detection vans to snoop on internet users
 
Sampo Syreeni
- [Cryptography] BBC to deploy detection vans to snoop on internet users
 
Dave Horsfall
- [Cryptography] BBC to deploy detection vans to snoop on	internet users
 
Kristian Gjøsteen
- [Cryptography] BBC to deploy detection vans to snoop on internet	users
 
Peter Gutmann
- [Cryptography] BBC to deploy detection vans to snoop on internet users
 
Dave Howe
- [Cryptography] BBC to deploy detection vans to snoop on internet users
 
james hughes
- [Cryptography] Public-key auth as envisaged by first-year science	students
 
Peter Gutmann
- [Cryptography] BBC to deploy detection vans to snoop on internet users
 
dj at deadhat.com
- [Cryptography] Public-key auth as envisaged by first-year	science students
 
Ron Garret
- [Cryptography] BBC to deploy detection vans to snoop	on	internet users
 
Jerry Leichter
- [Cryptography] Public-key auth as envisaged by first-year science students
 
John Denker
- [Cryptography] Public-key auth as envisaged by first-year science students
 
Ralf Senderek
- [Cryptography] Public-key auth as envisaged by first-year	science students
 
David Kane-Parry
- [Cryptography] Public-key auth as envisaged by first-year science students
 
Yui Hirasawa
- [Cryptography] Public-key auth as envisaged by first-year	science students
 
Jerry Leichter
- [Cryptography] Public-key auth as envisaged by first-year science students
 
Michael Kjörling
- [Cryptography] Public-key auth as envisaged by first-year	science students
 
Christian Huitema
- [Cryptography] BBC to deploy detection vans to snoop on internet users
 
Ray Dillinger
- [Cryptography] Public-key auth as envisaged by first-year science students
 
Michael Kjörling
- [Cryptography] Public-key auth as envisaged by first-year science students
 
Ralf Senderek
- [Cryptography] Public-key auth as envisaged by first-year science students
 
Dave Howe
- [Cryptography] Public-key auth as envisaged by first-year science students
 
Michael Kjörling
- [Cryptography] Public-key auth as envisaged by first-year science students
 
Dave Howe
- [Cryptography] Apple iOS and Keychain Sharing Security
 
Jerry Leichter
- [Cryptography] Pascal Coin: A P2P cryptocurrency without need of	historical operations
 
BPascal BlockChain
- [Cryptography] Public-key auth as envisaged by first-year science students
 
mok-kong shen
- [Cryptography] BBC to deploy detection vans to snoop on internet users
 
mok-kong shen
- [Cryptography] Public-key auth as envisaged by first-year	science students
 
Tom Mitchell
- [Cryptography] N. Korean radio broadcasts string of random numbers
 
Jan Pechanec
- [Cryptography] Generating random values in a particular range
 
John-Mark Gurney
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Robert Hettinga
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Allen
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Ray Dillinger
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Robert Hettinga
- [Cryptography] A conversation with Dan Boneh (2016-08-01 transcript)
 
Bryan Bishop
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Allen
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Ray Dillinger
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Allen
- [Cryptography] Generating random values in a particular range
 
Sidney Markowitz
- [Cryptography] Shadow Brokers :: powerful NSA hacking tools leaked
 
John Denker
- [Cryptography] Generating random values in a particular range
 
Bill Stewart
- [Cryptography] Shadow Brokers :: powerful NSA hacking tools	leaked
 
Jerry Leichter
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Natanael
- [Cryptography] Generating random values in a particular 	range
 
Arnold Reinhold
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Jerry Leichter
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Natanael
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Jehan Tremback
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Jehan Tremback
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Jerry Leichter
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Jerry Leichter
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Natanael
- [Cryptography] Phishing Attacks - Alice, HAL and Bob
 
Joseph Kilcullen
- [Cryptography] Confidential Document Management,	the right name or weaselly marketing?
 
Phillip Hallam-Baker
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Peter Todd
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Peter Todd
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Allen
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Ray Dillinger
- [Cryptography] Generating random values in a particular range
 
Ray Dillinger
- [Cryptography] Shadow Brokers :: powerful NSA hacking tools leaked
 
Ray Dillinger
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Peter Todd
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Allen
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Peter Todd
- [Cryptography] Generating random values in a particular range
 
Tom Mitchell
- [Cryptography] Phishing Attacks - Alice, HAL and Bob
 
Jerry Leichter
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Peter Todd
- [Cryptography] Phishing Attacks - Alice, HAL and Bob
 
Dirk-Willem van Gulik
- [Cryptography] Phishing Attacks - Alice, HAL and Bob
 
Phillip Hallam-Baker
- [Cryptography] Confidential Document Management,	the right name or weaselly marketing?
 
Bill Frantz
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Phillip Hallam-Baker
- [Cryptography] Phishing Attacks - Alice, HAL and Bob
 
Joseph Kilcullen
- [Cryptography] Confidential Document Management, the right name or weaselly marketing?
 
Phillip Hallam-Baker
- [Cryptography] Confidential Document Management, the right name or weaselly marketing?
 
Natanael
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Jameson Lopp
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Allen
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Allen
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Phillip Hallam-Baker
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Peter Todd
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Jameson Lopp
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Ray Dillinger
- [Cryptography] BBC to deploy detection vans to snoop on internet users
 
ianG
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Phillip Hallam-Baker
- [Cryptography] UK report on "Bulk Powers Review" of GCHQ	interception
 
John Gilmore
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Ray Dillinger
- [Cryptography] What is the status quo of the zero trust model?
 
mok-kong shen
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Phillip Hallam-Baker
- [Cryptography] MaidSafe
 
J.M. Porup
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Peter Todd
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Peter Todd
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
John Levine
- [Cryptography] What is the state of the art in policy specification	systems?
 
John Ioannidis
- [Cryptography] What is the state of the art in policy	specification	systems?
 
Randy Bush
- [Cryptography] Robust Linked Timestamps without Proof of Work.
 
Ron Garret
- [Cryptography] Phishing Attacks - Alice, HAL and Bob
 
Maxime MEYER
- [Cryptography] Phishing Attacks - Alice, HAL and Bob
 
Joseph Kilcullen
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Salz, Rich
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Christian Huitema
- [Cryptography] Real-world crypto/PRNG problem: Bridge
 
Ray Dillinger
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Ben Laurie
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Tony Arcieri
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Jon Callas
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Jon Callas
- [Cryptography] Real-world crypto/PRNG problem: Bridge
 
Joshua Marpet
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Viktor Dukhovni
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Jerry Leichter
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Thierry Moreau
- [Cryptography] Real-world crypto/PRNG problem: Bridge
 
Tom Mitchell
- [Cryptography] Real-world crypto/PRNG problem: Bridge
 
Tom Mitchell
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Bill Frantz
- [Cryptography] Voynich Manuscript to be published
 
Dave Horsfall
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than	previously thought"
 
Jerry Leichter
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Thierry Moreau
- [Cryptography] Real-world crypto/PRNG problem: Bridge
 
Dave Horsfall
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Jon Callas
- [Cryptography] Voynich Manuscript to be published
 
Chris Kuethe
- [Cryptography] Voynich Manuscript to be published
 
John Levine
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Kent Borg
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Peter Todd
- [Cryptography] Electronic currency revived after 20-year hiatus
 
Peter Todd
- [Cryptography] Real-world crypto/PRNG problem: Bridge
 
Tom Mitchell
- [Cryptography] Voynich Manuscript to be published
 
Jerry Leichter
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat	than previously thought"
 
Jerry Leichter
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Peter Gutmann
- [Cryptography] "NSA-linked Cisco exploit poses bigger	threat	than previously thought"
 
Peter Gutmann
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat	than previously thought"
 
John Levine
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Viktor Dukhovni
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat	than previously thought"
 
Ron Garret
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
alex at alten.org
- [Cryptography] "NSA-linked Cisco exploit poses bigger	threat	than previously thought"
 
Sebastian Krahmer
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Peter Gutmann
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Patrick
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Steven M. Bellovin
- [Cryptography] Insecure email might be an even bigger problem than	we suspected
 
Phillip Hallam-Baker
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Watson Ladd
- [Cryptography] Retire all 64-bit block ciphers.
 
Ray Dillinger
- [Cryptography] Insecure email might be an even bigger problem than we suspected
 
Ray Dillinger
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Kent Borg
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Dave Horsfall
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Patrick Chkoreff
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Russ Nelson
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat	than previously thought"
 
Jerry Leichter
- [Cryptography] Say 'unguessable' not random
 
Phillip Hallam-Baker
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Steven M. Bellovin
- [Cryptography] Say 'unguessable' not random
 
Ray Dillinger
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
Ray Dillinger
- [Cryptography] Real-world crypto/PRNG problem:  Bridge
 
Jon Callas
- [Cryptography] Say 'unguessable' not random
 
james hughes
- [Cryptography] Hashing with CTR mode?
 
Judson Lester
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Kent Borg
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat	than previously thought"
 
Bill Frantz
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat	than previously thought"
 
Ron Garret
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat	than previously thought"
 
Jerry Leichter
- [Cryptography] Secure VNC implementation
 
William Muriithi
- [Cryptography] Insecure email might be an even bigger problem than we suspected
 
Phillip Hallam-Baker
- [Cryptography] Say 'unguessable' not random
 
Patrick Chkoreff
- [Cryptography] programming languages and the people who (don't)	love them,	was "NSA-linked Cisco exploit poses bigger threat than previously	thought"
 
John Levine
- [Cryptography] programming languages and the people who (don't) love them, was "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Kent Borg
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
Dave Horsfall
- [Cryptography] programming languages and the people who (don't)	love them,	was "NSA-linked Cisco exploit poses bigger threat than previously	thought"
 
John Levine
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Tom Mitchell
- [Cryptography] Insecure email might be an even bigger problem than we suspected
 
Tom Mitchell
- [Cryptography] Secure VNC implementation
 
John Levine
- [Cryptography] programming languages and the people who (don't) love them, was "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Ray Dillinger
- [Cryptography] Insecure email might be an even bigger problem than we suspected
 
Ray Dillinger
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Dan McDonald
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Chris Kuethe
- [Cryptography] Say 'unguessable' not random
 
Jerry Leichter
- [Cryptography] "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Henry Baker
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco exploit poses bigger threat than previously thought"]
 
D. Hugh Redelmeier
- [Cryptography] programming languages and the people who (don't) love them, was "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Walter van Holst
- [Cryptography] programming languages and the people who (don't) love them, was "NSA-linked Cisco exploit poses bigger threat than previously thought"
 
Brian Smith
- [Cryptography] Secure VNC implementation
 
Albert Lunde
- [Cryptography] Secure VNC implementation
 
Jerry Leichter
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco	exploit poses bigger threat than previously thought"]
 
Ron Garret
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco exploit poses bigger threat than previously thought"]
 
Howard Chu
- [Cryptography] Say 'unguessable' not random
 
Kent Borg
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Ben Laurie
- [Cryptography] Secure VNC implementation
 
John Levine
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco	exploit poses bigger threat than previously thought"]
 
John Levine
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco exploit poses bigger threat than previously thought"]
 
Henry Baker
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
J.M. Porup
- [Cryptography] MaidSafe
 
Lee Clagett
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Peter Todd
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco	exploit poses bigger threat than previously thought"]
 
Ron Garret
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco	exploit poses bigger threat than previously thought"]
 
Ron Garret
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco	exploit poses bigger threat than previously thought"]
 
Ron Garret
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all	64-bit block ciphers.)
 
Dmitry Belyavsky
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Tom Mitchell
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco exploit poses bigger threat than previously thought"]
 
Tom Mitchell
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco	exploit poses bigger threat than previously thought"]
 
Ron Garret
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
grarpamp
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco exploit poses bigger threat than previously thought"]
 
Howard Chu
- [Cryptography] Secure VNC implementation
 
William Muriithi
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all	64-bit block ciphers.)
 
Jerry Leichter
- [Cryptography] Programming language technology (was Re: "NSA-linked Cisco exploit poses bigger threat than previously thought")
 
Perry E. Metzger
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
Perry E. Metzger
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
 
Dmitry Belyavsky
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Allen
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Ron Garret
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
Perry E. Metzger
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
Joseph Kilcullen
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco exploit poses bigger threat than previously thought"]
 
Henry Baker
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
dj at deadhat.com
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Jerry Leichter
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
grarpamp
- [Cryptography] What is a safe CPU? (was Re: ORWL - The First Open Source, Physically Secure Computer)
 
Perry E. Metzger
- [Cryptography] foreign hacks of state election systems
 
John Denker
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
 
Stanislav V. Smyshlyaev
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Ben Laurie
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
Perry E. Metzger
- [Cryptography] tail recursion in C [was Re: "NSA-linked Cisco exploit poses bigger threat than previously thought"]
 
Ray Dillinger
- [Cryptography] FBI says foreign hackers have penetrated US state election databases.
 
Perry E. Metzger
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Ben Laurie
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
Perry E. Metzger
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Ben Laurie
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Bill Frantz
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Tom Mitchell
- [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Randy Bush
- [Cryptography] Strength of 3DES?
 
Richard Outerbridge
- [Cryptography] Strength of 3DES?
 
Scott G. Kelly
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
 
Phillip Hallam-Baker
- [Cryptography] Real-world crypto/PRNG problem: Bridge
 
Nicolas Hammond
- [Cryptography] N. Korean radio broadcasts string of random	numbers
 
grarpamp
- [Cryptography] Strength of 3DES?
 
Jon Callas
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all	64-bit block ciphers.)
 
Bill Frantz
- [Cryptography] Capability Systems (was Re: ORWL - The First Open Source, Physically Secure Computer)
 
Perry E. Metzger
- [Cryptography] Capability Systems (was Re: ORWL - The First Open Source, Physically Secure Computer)
 
Ben Laurie
- [Cryptography] N. Korean radio broadcasts string of random numbers
 
Ray Dillinger
- [Cryptography] Strength of 3DES?
 
Ray Dillinger
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
 
Ray Dillinger
- [Cryptography] Capability Systems
 
Jeff Burdges
- [Cryptography] N. Korean radio broadcasts string of random	numbers
 
Bill Cox
- [Cryptography] Capability Systems (was Re: ORWL - The First Open Source, Physically Secure Computer)
 
Rob Meijer
- [Cryptography] N. Korean radio broadcasts string of random	numbers
 
Bill Frantz
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
 
Stanislav V. Smyshlyaev
- [Cryptography] Strength of 3DES?
 
Peter Gutmann
- [Cryptography] N. Korean radio broadcasts string of random	numbers
 
grarpamp
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
 
Kristian Gjøsteen
- [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
 
Georgi Guninski
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
 
Natanael
- [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
 
Kristian Gjøsteen
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all	64-bit block ciphers.)
 
Jerry Leichter
    
      Last message date: 
       Wed Aug 31 16:34:26 EDT 2016
    Archived on: Wed Aug 31 16:46:26 EDT 2016
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).