September 2016 Archives by subject
Starting: Thu Sep 1 01:52:24 EDT 2016
Ending: Fri Sep 30 21:07:27 EDT 2016
Messages: 358
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Jerry Leichter
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Florian Weimer
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Jeff Burdges
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Jerry Leichter
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Bart Preneel
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Georgi Guninski
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Florian Weimer
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Natanael
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Florian Weimer
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Florian Weimer
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Jerry Leichter
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Jerry Leichter
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Bill Frantz
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Philipp Gühring
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
mok-kong shen
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
dj at deadhat.com
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
Henry Baker
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
dj at deadhat.com
- [Cryptography] ?crypto in fully functional style
John Denker
- [Cryptography] ?crypto in fully functional style
David Kane-Parry
- [Cryptography] ?crypto in fully functional style
Henry Baker
- [Cryptography] [Crypto-practicum] An historical document
Arnold Reinhold
- [Cryptography] [Crypto-practicum] An historical document.
Henry Baker
- [Cryptography] [Crypto-practicum] An historical document.
Ray Dillinger
- [Cryptography] [Crypto-practicum] An historical document.
Henry Baker
- [Cryptography] [Crypto-practicum] An historical document.
Ray Dillinger
- [Cryptography] [Crypto-practicum] An historical document.
Henry Baker
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Ron Garret
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Ray Dillinger
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Henry Baker
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Ron Garret
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Ray Dillinger
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Henry Baker
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Kent Borg
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Henry Baker
- [Cryptography] [Crypto-practicum] Secure erasure in C.
Ron Garret
- [Cryptography] [FORGED] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
Arnold Reinhold
- [Cryptography] Ada vs Rust vs safer C
Alfie John
- [Cryptography] Ada vs Rust vs safer C
Ron Garret
- [Cryptography] Ada vs Rust vs safer C
John Levine
- [Cryptography] Ada vs Rust vs safer C
Watson Ladd
- [Cryptography] Ada vs Rust vs safer C
Henry Baker
- [Cryptography] Ada vs Rust vs safer C
Hanno Böck
- [Cryptography] Ada vs Rust vs safer C
Jeff Burdges
- [Cryptography] Ada vs Rust vs safer C
Jerry Leichter
- [Cryptography] Ada vs Rust vs safer C
Jerry Leichter
- [Cryptography] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
John Denker
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
Ron Garret
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
Ray Dillinger
- [Cryptography] Ada vs Rust vs safer C
Watson Ladd
- [Cryptography] Ada vs Rust vs safer C
Kent Borg
- [Cryptography] Ada vs Rust vs safer C
John Gilmore
- [Cryptography] Ada vs Rust vs safer C
Ron Garret
- [Cryptography] Ada vs Rust vs safer C
Ron Garret
- [Cryptography] Ada vs Rust vs safer C
Ron Garret
- [Cryptography] Ada vs Rust vs safer C
Jerry Leichter
- [Cryptography] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
Tom Mitchell
- [Cryptography] Ada vs Rust vs safer C
Ben Laurie
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
John Gilmore
- [Cryptography] Ada vs Rust vs safer C
Jerry Leichter
- [Cryptography] Ada vs Rust vs safer C
Christian Huitema
- [Cryptography] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
Arnold Reinhold
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
John Gilmore
- [Cryptography] Ada vs Rust vs safer C
Jerry Leichter
- [Cryptography] Ada vs Rust vs safer C
Jerry Leichter
- [Cryptography] Ada vs Rust vs safer C
Christian Huitema
- [Cryptography] Ada vs Rust vs safer C
Ray Dillinger
- [Cryptography] Ada vs Rust vs safer C
Arnold Reinhold
- [Cryptography] Ada vs Rust vs safer C
Tom Mitchell
- [Cryptography] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
Peter Gutmann
- [Cryptography] Ada vs Rust vs safer C
Ron Garret
- [Cryptography] Ada vs Rust vs safer C
Kent Borg
- [Cryptography] Ada vs Rust vs safer C
Jerry Leichter
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] Ada vs Rust vs safer C
John Denker
- [Cryptography] Ada vs Rust vs safer C
Arnold Reinhold
- [Cryptography] Ada vs Rust vs safer C
Florian Weimer
- [Cryptography] An historical document.
Ray Dillinger
- [Cryptography] another security vulnerability / travesty
John Denker
- [Cryptography] Bamford: Over Eight Years, President, Barack Obama Has Created the Most Intrusive Surveillance Apparatus in, the World. To What End?
Bob Wilson
- [Cryptography] Bamford: Over Eight Years, President Barack Obama Has Created the Most Intrusive Surveillance Apparatus in the World. To What End?
John Gilmore
- [Cryptography] Bamford: Over Eight Years, President Barack Obama Has Created the Most Intrusive Surveillance Apparatus in the World. To What End?
Ray Dillinger
- [Cryptography] Bamford: Over Eight Years, President Barack Obama Has Created the Most Intrusive Surveillance Apparatus in the World. To What End?
Tom Mitchell
- [Cryptography] Bridge hand record generator cracked
Nicolas%20Hammond
- [Cryptography] Bug in Signal - and what it says about, programming
Vikas Kumar
- [Cryptography] Bug in Signal - and what it says about, programming
David Kane-Parry
- [Cryptography] Bug in Signal - and what it says about programming
Jerry Leichter
- [Cryptography] CARDIS 2016 call for participation
Aurelien Francillon
- [Cryptography] Complexity as an Asset vs. Liability
Kent Borg
- [Cryptography] defending against common errors
Ray Dillinger
- [Cryptography] defending against common errors
Ray Dillinger
- [Cryptography] defending against common errors (was: secure erasure)
John Denker
- [Cryptography] defending against common errors (was: secure erasure)
John Denker
- [Cryptography] defending against common errors (was: secure erasure)
John Denker
- [Cryptography] defending against common errors (was: secure erasure)
Peter Gutmann
- [Cryptography] defending against common errors (was: secure erasure)
Ron Garret
- [Cryptography] defending against common errors (was: secure erasure)
Mansour Moufid
- [Cryptography] distrusted root CA: WoSign
John Denker
- [Cryptography] Finding the least significant bit of RSA secret exponent from few signatures?
Georgi Guninski
- [Cryptography] Finding the least significant bit of RSA secret exponent from few signatures?
Ray Dillinger
- [Cryptography] Finding the least significant bit of RSA secret exponent from few signatures?
rcs at xmission.com
- [Cryptography] Finding the least significant bit of RSA secret exponent from few signatures?
Georgi Guninski
- [Cryptography] Fwd: [fc-announce] FC 2017 - Call for Papers
R. Hirschfeld
- [Cryptography] Fwd: Re: [FORGED] Ada vs Rust vs safer C
Stephan Neuhaus
- [Cryptography] Happy birthday, James Ellis!
Dave Horsfall
- [Cryptography] Happy birthday, James Ellis!
Ron Garret
- [Cryptography] Hardware / True RNG human bias (or: crypto as we know it is doomed :)
Yann Droneaud
- [Cryptography] Interesting article on Bletchley Park
Dave Horsfall
- [Cryptography] iOS 10 backups easier to hack than iOS 9 backups
Henry Baker
- [Cryptography] iOS 10 backups easier to hack than iOS 9 backups
Tom Mitchell
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
crypto.jmk at gmail.com
- [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
Phillip Hallam-Baker
- [Cryptography] massively parallel processing
John Denker
- [Cryptography] massively parallel processing
Henry Baker
- [Cryptography] massively parallel processing
Phillip Hallam-Baker
- [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
Georgi Guninski
- [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
Viktor Dukhovni
- [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
Daniel Robinson
- [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
Georgi Guninski
- [Cryptography] N. Korean radio broadcasts string of random numbers
Dave Horsfall
- [Cryptography] N. Korean radio broadcasts string of random numbers
Tom Mitchell
- [Cryptography] N. Korean radio broadcasts string of random numbers
Henry Baker
- [Cryptography] Negative energy pricing and Bitcoin
Arnold Reinhold
- [Cryptography] Network steganography
mok-kong shen
- [Cryptography] New approach needed to IT, says NIST's top cyber scientist
Kent Borg
- [Cryptography] New approach needed to IT, says NIST's top cyber scientist
Kent Borg
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
Francisco Corella
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
Peter Todd
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
grarpamp
- [Cryptography] ORWL - The First Open Source, Physically Secure Computer
Francisco Corella
- [Cryptography] Physical security risks of onetime pads just changed
Arnold Reinhold
- [Cryptography] Physical security risks of onetime pads just changed.
Tom Mitchell
- [Cryptography] Physical security risks of onetime pads just changed.
Natanael
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Ron Garret
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Ron Garret
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Antonio Sanso
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Peter Gutmann
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Ron Garret
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Ron Garret
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Viktor Dukhovni
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Kristian Gjøsteen
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Peter Gutmann
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Kristian Gjøsteen
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Martin Rublik
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Salz, Rich
- [Cryptography] Privacy-enhanced OpenPGP
Florian Weimer
- [Cryptography] Privacy-enhanced OpenPGP
Ángel González
- [Cryptography] Privacy-enhanced OpenPGP
James Cloos
- [Cryptography] Privacy-enhanced OpenPGP
Werner Koch
- [Cryptography] Readable manuals, and fixing bugs by documenting them
Bob Wilson
- [Cryptography] Readable manuals, and fixing bugs by documenting them
Tom Mitchell
- [Cryptography] Recommendations for short AES passphrases
ıuoʎ
- [Cryptography] Recommendations for short AES passphrases
Jon Callas
- [Cryptography] Recommendations for short AES passphrases
grarpamp
- [Cryptography] Recommendations for short AES passphrases
ıuoʎ
- [Cryptography] Recommendations for short AES passphrases
Tom Mitchell
- [Cryptography] Recommendations for short AES passphrases
Kent Borg
- [Cryptography] Recommendations for short AES passphrases
Michael Kjörling
- [Cryptography] Recommendations for short AES passphrases
Sidney Markowitz
- [Cryptography] Recommendations for short AES passphrases
ıuoʎ
- [Cryptography] Recommendations for short AES passphrases
grarpamp
- [Cryptography] Recommendations in lieu of short AES passphrases
John Denker
- [Cryptography] Recommendations in lieu of short AES passphrases
Michael Kjörling
- [Cryptography] Recommendations in lieu of short AES passphrases
Kent Borg
- [Cryptography] Recommendations in lieu of short AES passphrases
John Denker
- [Cryptography] Recommendations in lieu of short AES passphrases
Michael Kjörling
- [Cryptography] Recommendations in lieu of short AES passphrases
Kent Borg
- [Cryptography] Recommendations in lieu of short AES passphrases
Kevin W. Wall
- [Cryptography] Recommendations in lieu of short AES passphrases
Michael Kjörling
- [Cryptography] Recommendations in lieu of short AES passphrases
Kent Borg
- [Cryptography] Secure erasure
John Denker
- [Cryptography] Secure erasure
Arnold Reinhold
- [Cryptography] Secure erasure
Henry Baker
- [Cryptography] Secure erasure
John Denker
- [Cryptography] Secure erasure
Kent Borg
- [Cryptography] Secure erasure
John Denker
- [Cryptography] Secure erasure
Ray Dillinger
- [Cryptography] Secure erasure
Peter Gutmann
- [Cryptography] Secure erasure
Jerry Leichter
- [Cryptography] Secure erasure
Ralf Senderek
- [Cryptography] Secure erasure
Henry Baker
- [Cryptography] Secure erasure
Kent Borg
- [Cryptography] Secure erasure
Patrick Pelletier
- [Cryptography] Secure erasure
Jerry Leichter
- [Cryptography] Secure erasure
John Denker
- [Cryptography] Secure erasure
Aram Perez
- [Cryptography] Secure erasure
Ray Dillinger
- [Cryptography] Secure erasure
Peter Gutmann
- [Cryptography] Secure erasure
Ralf Senderek
- [Cryptography] Secure erasure
Jerry Leichter
- [Cryptography] Secure erasure
Ralf Senderek
- [Cryptography] Secure erasure
Jerry Leichter
- [Cryptography] Secure erasure
Ralf Senderek
- [Cryptography] Secure erasure
Ray Dillinger
- [Cryptography] Secure erasure
Stephen Farrell
- [Cryptography] Secure erasure
alex at alten.org
- [Cryptography] Secure erasure
Ralf Senderek
- [Cryptography] Secure erasure
Peter Gutmann
- [Cryptography] Secure erasure
Stephen Farrell
- [Cryptography] Secure erasure
Peter Gutmann
- [Cryptography] Secure erasure
Watson Ladd
- [Cryptography] Secure erasure
Jerry Leichter
- [Cryptography] Secure erasure
Tom Mitchell
- [Cryptography] Secure erasure
Henry Baker
- [Cryptography] Secure erasure
Ron Garret
- [Cryptography] Secure erasure
Kent Borg
- [Cryptography] Secure erasure
Henry Baker
- [Cryptography] Secure erasure
Jerry Leichter
- [Cryptography] Secure erasure
alex at alten.org
- [Cryptography] Secure erasure
Ray Dillinger
- [Cryptography] Secure erasure
Tony Arcieri
- [Cryptography] Secure erasure
Henry Baker
- [Cryptography] Secure erasure
Kent Borg
- [Cryptography] Secure erasure
Peter Gutmann
- [Cryptography] Secure erasure
Richard Outerbridge
- [Cryptography] Secure erasure
alex at alten.org
- [Cryptography] Secure erasure
Henry Baker
- [Cryptography] Secure erasure
Bill Frantz
- [Cryptography] Secure erasure
Jerry Leichter
- [Cryptography] Secure erasure
Bill Frantz
- [Cryptography] Secure erasure - Ada may be a solution.
Ray Dillinger
- [Cryptography] Secure erasure in C.
Ray Dillinger
- [Cryptography] Secure erasure in C.
Harlan Lieberman-Berg
- [Cryptography] Secure erasure in C.
Tony Arcieri
- [Cryptography] Secure erasure in C.
Phillip Hallam-Baker
- [Cryptography] Secure erasure in C.
Kent Borg
- [Cryptography] Secure erasure in C.
Patrick
- [Cryptography] Secure erasure in C.
Ray Dillinger
- [Cryptography] Secure erasure in C.
Salz, Rich
- [Cryptography] Secure erasure in C.
Patrick Pelletier
- [Cryptography] Secure erasure in C.
Phillip Hallam-Baker
- [Cryptography] Secure erasure in C.
Tom Mitchell
- [Cryptography] Secure erasure in C.
Jerry Leichter
- [Cryptography] Secure erasure in C.
Patrick Pelletier
- [Cryptography] Secure erasure in C.
Ray Dillinger
- [Cryptography] Secure erasure in C.
Ray Dillinger
- [Cryptography] Secure erasure in C.
Ben Laurie
- [Cryptography] Secure erasure in C.
Christian Huitema
- [Cryptography] Secure erasure in C.
Henry Baker
- [Cryptography] Secure erasure in C.
Henry Baker
- [Cryptography] Secure erasure in C.
Benjamin Kreuter
- [Cryptography] Secure erasure in C.
Tony Arcieri
- [Cryptography] Secure erasure in C.
Ray Dillinger
- [Cryptography] Secure erasure in C.
Henry Baker
- [Cryptography] Secure erasure in C.
Tom Mitchell
- [Cryptography] Secure erasure in C.
Jerry Leichter
- [Cryptography] Secure erasure in C.
Tom Mitchell
- [Cryptography] Secure erasure in C.
Kent Borg
- [Cryptography] Secure erasure in C.
Peter Gutmann
- [Cryptography] Spooky quantum radar at a distance
Henry Baker
- [Cryptography] Spooky quantum radar at a distance
Peter Gutmann
- [Cryptography] Spooky quantum radar at a distance
Natanael
- [Cryptography] Spooky quantum radar at a distance
Dave Horsfall
- [Cryptography] Spooky quantum radar at a distance
Jerry Leichter
- [Cryptography] Spooky quantum radar at a distance
Natanael
- [Cryptography] Spooky quantum radar at a distance
Viktor Dukhovni
- [Cryptography] Spooky quantum radar at a distance
dj at deadhat.com
- [Cryptography] Spooky quantum radar at a distance
John Denker
- [Cryptography] Spooky quantum radar at a distance
Tom Mitchell
- [Cryptography] Spooky quantum radar at a distance
Watson Ladd
- [Cryptography] Spooky quantum radar at a distance
Ron Garret
- [Cryptography] Spooky quantum radar at a distance
Jerry Leichter
- [Cryptography] Spooky quantum radar at a distance
Henry Baker
- [Cryptography] Spooky quantum radar at a distance
John Denker
- [Cryptography] Strong DNS Names
Phill
- [Cryptography] Strong DNS Names
Natanael
- [Cryptography] Strong DNS Names
Viktor Dukhovni
- [Cryptography] Strong DNS Names
Ralf Senderek
- [Cryptography] Strong DNS Names
Donald Eastlake
- [Cryptography] Strong DNS Names
Tom Mitchell
- [Cryptography] Strong DNS Names
Christian Huitema
- [Cryptography] Strong DNS Names
Phillip Hallam-Baker
- [Cryptography] Strong DNS Names
Adam Sampson
- [Cryptography] Strong DNS Names
Tom Mitchell
- [Cryptography] Strong DNS Names
Dave Horsfall
- [Cryptography] Strong DNS Names
Viktor Dukhovni
- [Cryptography] Threat Model: Bluetooth tracking beacons
Henry Baker
- [Cryptography] Threat Model: Bluetooth tracking beacons
Natanael
- [Cryptography] Threat Model: Bluetooth tracking beacons
Kent Borg
- [Cryptography] Threat Model: Bluetooth tracking beacons
Tom Mitchell
- [Cryptography] Threat Model: Bluetooth tracking beacons
Natanael
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Thierry Moreau
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Ray Dillinger
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Thierry Moreau
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Bill Cox
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Ray Dillinger
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Bob Wilson
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Bill Cox
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Jerry Leichter
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Thierry Moreau
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Thierry Moreau
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
dj at deadhat.com
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Ray Dillinger
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Jerry Leichter
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
sebastien riou
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Kevin W. Wall
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
David Johnston
- [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
Bill Cox
- [Cryptography] Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Georgi Guninski
- [Cryptography] Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
Viktor Dukhovni
- [Cryptography] Use Linux for its security
Jerry Leichter
- [Cryptography] Use Linux for its security
Ralf Senderek
- [Cryptography] Use Linux for its security
Ron Garret
- [Cryptography] Use Linux for its security
Jerry Leichter
- [Cryptography] Use Linux for its security
Phillip Hallam-Baker
- [Cryptography] Use Linux for its security
Patrick Chkoreff
- [Cryptography] Use Linux for its security
Bill Frantz
- [Cryptography] Use Linux for its security
Ray Dillinger
- [Cryptography] Use Linux for its security
J.M. Porup
- [Cryptography] Use Linux for its security
Kent Borg
- [Cryptography] Use Linux for its security
Jason Cooper
- [Cryptography] Use Linux for its security
Theodore Ts'o
- [Cryptography] Use Linux for its security
Ray Dillinger
- [Cryptography] Use Linux for its security
Ralf Senderek
- [Cryptography] Use Linux for its security
Dave Horsfall
- [Cryptography] Use Linux for its security
J.M. Porup
- [Cryptography] Use Linux for its security
Ray Dillinger
- [Cryptography] Use Linux for its security
Henry Baker
- [Cryptography] Use Linux for its security
Theodore Ts'o
- [Cryptography] Well defined architectures, was Secure erasure
John Levine
- [Cryptography] Why TLS? Why not modern authenticated D-H exchange?
Thierry Moreau
- [Cryptography] Widest Rainbow Table?
grarpamp
- [Cryptography] WoSign CA in trouble with at least Firefox...
Viktor Dukhovni
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
Georgi Guninski
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
Kevin W. Wall
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
Bill Stewart
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
Georgi Guninski
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
Allen
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
John Levine
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
Ray Dillinger
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
Phillip Hallam-Baker
- [Cryptography] Yahoo is sued for gross negligence over huge hacking
Georgi Guninski
Last message date:
Fri Sep 30 21:07:27 EDT 2016
Archived on: Sat Oct 1 03:40:04 EDT 2016
This archive was generated by
Pipermail 0.09 (Mailman edition).