September 2016 Archives by subject
      
      Starting: Thu Sep  1 01:52:24 EDT 2016
         Ending: Fri Sep 30 21:07:27 EDT 2016
         Messages: 358
     
- [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software	Stack"
 
Jerry Leichter
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the	Software Stack"
 
Florian Weimer
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
 
Jeff Burdges
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the	Software Stack"
 
Jerry Leichter
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
 
Bart Preneel
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
 
Georgi Guninski
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the	Software Stack"
 
Florian Weimer
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
 
Natanael
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the	Software Stack"
 
Florian Weimer
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the	Software Stack"
 
Florian Weimer
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the	Software Stack"
 
Jerry Leichter
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the	Software Stack"
 
Jerry Leichter
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the	Software Stack"
 
Bill Frantz
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in	the	Software Stack"
 
Philipp Gühring
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
 
mok-kong shen
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
 
dj at deadhat.com
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
 
Henry Baker
 - [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"
 
dj at deadhat.com
 - [Cryptography] ?crypto in fully functional style
 
John Denker
 - [Cryptography] ?crypto in fully functional style
 
David Kane-Parry
 - [Cryptography] ?crypto in fully functional style
 
Henry Baker
 - [Cryptography] [Crypto-practicum] An historical document
 
Arnold Reinhold
 - [Cryptography] [Crypto-practicum] An historical document.
 
Henry Baker
 - [Cryptography] [Crypto-practicum] An historical document.
 
Ray Dillinger
 - [Cryptography] [Crypto-practicum] An historical document.
 
Henry Baker
 - [Cryptography] [Crypto-practicum] An historical document.
 
Ray Dillinger
 - [Cryptography] [Crypto-practicum] An historical document.
 
Henry Baker
 - [Cryptography] [Crypto-practicum] Secure erasure in C.
 
Ron Garret
 - [Cryptography] [Crypto-practicum] Secure erasure in C.
 
Ray Dillinger
 - [Cryptography] [Crypto-practicum]  Secure erasure in C.
 
Henry Baker
 - [Cryptography] [Crypto-practicum] Secure erasure in C.
 
Ron Garret
 - [Cryptography] [Crypto-practicum] Secure erasure in C.
 
Ray Dillinger
 - [Cryptography] [Crypto-practicum]  Secure erasure in C.
 
Henry Baker
 - [Cryptography] [Crypto-practicum] Secure erasure in C.
 
Kent Borg
 - [Cryptography] [Crypto-practicum] Secure erasure in C.
 
Henry Baker
 - [Cryptography] [Crypto-practicum]  Secure erasure in C.
 
Ron Garret
 - [Cryptography] [FORGED]  Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
Arnold Reinhold
 - [Cryptography] Ada vs Rust vs safer C
 
Alfie John
 - [Cryptography] Ada vs Rust vs safer C
 
Ron Garret
 - [Cryptography] Ada vs Rust vs safer C
 
John Levine
 - [Cryptography] Ada vs Rust vs safer C
 
Watson Ladd
 - [Cryptography] Ada vs Rust vs safer C
 
Henry Baker
 - [Cryptography] Ada vs Rust vs safer C
 
Hanno Böck
 - [Cryptography] Ada vs Rust vs safer C
 
Jeff Burdges
 - [Cryptography] Ada vs Rust vs safer C
 
Jerry Leichter
 - [Cryptography] Ada vs Rust vs safer C
 
Jerry Leichter
 - [Cryptography] Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
John Denker
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
Ron Garret
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
Ray Dillinger
 - [Cryptography] Ada vs Rust vs safer C
 
Watson Ladd
 - [Cryptography] Ada vs Rust vs safer C
 
Kent Borg
 - [Cryptography] Ada vs Rust vs safer C
 
John Gilmore
 - [Cryptography] Ada vs Rust vs safer C
 
Ron Garret
 - [Cryptography] Ada vs Rust vs safer C
 
Ron Garret
 - [Cryptography] Ada vs Rust vs safer C
 
Ron Garret
 - [Cryptography] Ada vs Rust vs safer C
 
Jerry Leichter
 - [Cryptography] Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
Tom Mitchell
 - [Cryptography] Ada vs Rust vs safer C
 
Ben Laurie
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
John Gilmore
 - [Cryptography] Ada vs Rust vs safer C
 
Jerry Leichter
 - [Cryptography] Ada vs Rust vs safer C
 
Christian Huitema
 - [Cryptography] Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
Arnold Reinhold
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
John Gilmore
 - [Cryptography] Ada vs Rust vs safer C
 
Jerry Leichter
 - [Cryptography] Ada vs Rust vs safer C
 
Jerry Leichter
 - [Cryptography] Ada vs Rust vs safer C
 
Christian Huitema
 - [Cryptography] Ada vs Rust vs safer C
 
Ray Dillinger
 - [Cryptography] Ada vs Rust vs safer C
 
Arnold Reinhold
 - [Cryptography] Ada vs Rust vs safer C
 
Tom Mitchell
 - [Cryptography] Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
Peter Gutmann
 - [Cryptography] Ada vs Rust vs safer C
 
Ron Garret
 - [Cryptography] Ada vs Rust vs safer C
 
Kent Borg
 - [Cryptography] Ada vs Rust vs safer C
 
Jerry Leichter
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] Ada vs Rust vs safer C
 
John Denker
 - [Cryptography] Ada vs Rust vs safer C
 
Arnold Reinhold
 - [Cryptography] Ada vs Rust vs safer C
 
Florian Weimer
 - [Cryptography] An historical document.
 
Ray Dillinger
 - [Cryptography] another security vulnerability / travesty
 
John Denker
 - [Cryptography] Bamford: Over Eight Years, President, Barack Obama Has Created the Most Intrusive Surveillance Apparatus in, the World. To What End?
 
Bob Wilson
 - [Cryptography] Bamford: Over Eight Years,	President Barack Obama Has Created the Most Intrusive Surveillance	Apparatus in the World. To What End?
 
John Gilmore
 - [Cryptography] Bamford: Over Eight Years, President Barack Obama Has Created the Most Intrusive Surveillance Apparatus in the World. To What End?
 
Ray Dillinger
 - [Cryptography] Bamford: Over Eight Years, President Barack Obama Has Created the Most Intrusive Surveillance Apparatus in the World. To What End?
 
Tom Mitchell
 - [Cryptography] Bridge hand record generator cracked
 
Nicolas%20Hammond
 - [Cryptography] Bug in Signal - and what it says about, programming
 
Vikas Kumar
 - [Cryptography] Bug in Signal - and what it says about,	programming
 
David Kane-Parry
 - [Cryptography] Bug in Signal - and what it says about programming
 
Jerry Leichter
 - [Cryptography] CARDIS 2016 call for participation
 
Aurelien Francillon
 - [Cryptography] Complexity as an Asset vs. Liability
 
Kent Borg
 - [Cryptography] defending against common errors
 
Ray Dillinger
 - [Cryptography] defending against common errors
 
Ray Dillinger
 - [Cryptography] defending against common errors (was: secure erasure)
 
John Denker
 - [Cryptography] defending against common errors (was: secure erasure)
 
John Denker
 - [Cryptography] defending against common errors (was: secure	erasure)
 
John Denker
 - [Cryptography] defending against common errors (was:	secure	erasure)
 
Peter Gutmann
 - [Cryptography] defending against common errors (was: secure	erasure)
 
Ron Garret
 - [Cryptography] defending against common errors (was: secure	erasure)
 
Mansour Moufid
 - [Cryptography] distrusted root CA: WoSign
 
John Denker
 - [Cryptography] Finding the least significant bit of RSA secret exponent from few signatures?
 
Georgi Guninski
 - [Cryptography] Finding the least significant bit of RSA secret exponent from few signatures?
 
Ray Dillinger
 - [Cryptography] Finding the least significant bit of RSA	secret	exponent from few signatures?
 
rcs at xmission.com
 - [Cryptography] Finding the least significant bit of RSA	secret	exponent from few signatures?
 
Georgi Guninski
 - [Cryptography] Fwd: [fc-announce] FC 2017 - Call for Papers
 
R. Hirschfeld
 - [Cryptography] Fwd: Re:  [FORGED] Ada vs Rust vs safer C
 
Stephan Neuhaus
 - [Cryptography] Happy birthday, James Ellis!
 
Dave Horsfall
 - [Cryptography] Happy birthday, James Ellis!
 
Ron Garret
 - [Cryptography] Hardware / True RNG human bias (or: crypto as we know it is doomed :)
 
Yann Droneaud
 - [Cryptography] Interesting article on Bletchley Park
 
Dave Horsfall
 - [Cryptography] iOS 10 backups easier to hack than iOS 9 backups
 
Henry Baker
 - [Cryptography] iOS 10 backups easier to hack than iOS 9 backups
 
Tom Mitchell
 - [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all	64-bit block ciphers.)
 
crypto.jmk at gmail.com
 - [Cryptography] Key meshing (Re: [Crypto-practicum] Retire all 64-bit block ciphers.)
 
Phillip Hallam-Baker
 - [Cryptography] massively parallel processing
 
John Denker
 - [Cryptography] massively parallel processing
 
Henry Baker
 - [Cryptography] massively parallel processing
 
Phillip Hallam-Baker
 - [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
 
Georgi Guninski
 - [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
 
Viktor Dukhovni
 - [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
 
Daniel Robinson
 - [Cryptography] MATH: Unlikely correctness of paper will break some discrete logarithm over F_p^*
 
Georgi Guninski
 - [Cryptography] N. Korean radio broadcasts string of random numbers
 
Dave Horsfall
 - [Cryptography] N. Korean radio broadcasts string of random	numbers
 
Tom Mitchell
 - [Cryptography] N. Korean radio broadcasts string of random numbers
 
Henry Baker
 - [Cryptography] Negative energy pricing and Bitcoin
 
Arnold Reinhold
 - [Cryptography] Network steganography
 
mok-kong shen
 - [Cryptography] New approach needed to IT,	says NIST's top cyber scientist
 
Kent Borg
 - [Cryptography] New approach needed to IT, says NIST's top cyber scientist
 
Kent Borg
 - [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Francisco Corella
 - [Cryptography] ORWL - The First Open Source, Physically Secure Computer
 
Peter Todd
 - [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
grarpamp
 - [Cryptography] ORWL - The First Open Source,	Physically Secure Computer
 
Francisco Corella
 - [Cryptography] Physical security risks of onetime pads just changed
 
Arnold Reinhold
 - [Cryptography] Physical security risks of onetime pads just changed.
 
Tom Mitchell
 - [Cryptography] Physical security risks of onetime pads just	changed.
 
Natanael
 - [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Georgi Guninski
 - [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Georgi Guninski
 - [Cryptography] Posting the keys/certs for: Two distinct DSA	keys sign a file with the same signature. Is this repudiation issue?
 
Ron Garret
 - [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Georgi Guninski
 - [Cryptography] Posting the keys/certs for: Two distinct DSA	keys sign a file with the same signature. Is this repudiation issue?
 
Ron Garret
 - [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Antonio Sanso
 - [Cryptography] Posting the keys/certs for: Two distinct DSA	keys sign a file with the same signature. Is this repudiation issue?
 
Peter Gutmann
 - [Cryptography] Posting the keys/certs for: Two distinct	DSA	keys sign a file with the same signature. Is this	repudiation issue?
 
Ron Garret
 - [Cryptography] Posting the keys/certs for: Two distinct	DSA	keys sign a file with the same signature. Is this	repudiation issue?
 
Georgi Guninski
 - [Cryptography] Posting the keys/certs for: Two distinct DSA	keys sign a file with the same signature. Is this repudiation issue?
 
Ron Garret
 - [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Viktor Dukhovni
 - [Cryptography] Posting the keys/certs for: Two distinct DSA	keys sign a file with the same signature. Is this repudiation issue?
 
Kristian Gjøsteen
 - [Cryptography] Posting the keys/certs for: Two distinct DSA	keys sign a file with the same signature. Is this repudiation issue?
 
Peter Gutmann
 - [Cryptography] Posting the keys/certs for: Two distinct DSA	keys sign a file with the same signature. Is this repudiation issue?
 
Kristian Gjøsteen
 - [Cryptography] Posting the keys/certs for: Two distinct	DSA	keys sign a file with the same signature. Is this	repudiation issue?
 
Georgi Guninski
 - [Cryptography] Posting the keys/certs for: Two distinct	DSA	keys sign a file with the same signature. Is this	repudiation issue?
 
Georgi Guninski
 - [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Martin Rublik
 - [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Georgi Guninski
 - [Cryptography] Posting the keys/certs for: Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Salz, Rich
 - [Cryptography] Privacy-enhanced OpenPGP
 
Florian Weimer
 - [Cryptography] Privacy-enhanced OpenPGP
 
Ángel González
 - [Cryptography] Privacy-enhanced OpenPGP
 
James Cloos
 - [Cryptography] Privacy-enhanced OpenPGP
 
Werner Koch
 - [Cryptography] Readable manuals, and fixing bugs by documenting them
 
Bob Wilson
 - [Cryptography] Readable manuals,	and fixing bugs by documenting them
 
Tom Mitchell
 - [Cryptography] Recommendations for short AES passphrases
 
ıuoʎ
 - [Cryptography] Recommendations for short AES passphrases
 
Jon Callas
 - [Cryptography] Recommendations for short AES passphrases
 
grarpamp
 - [Cryptography] Recommendations for short AES passphrases
 
ıuoʎ
 - [Cryptography]  Recommendations for short AES passphrases
 
Tom Mitchell
 - [Cryptography] Recommendations for short AES passphrases
 
Kent Borg
 - [Cryptography] Recommendations for short AES passphrases
 
Michael Kjörling
 - [Cryptography] Recommendations for short AES passphrases
 
Sidney Markowitz
 - [Cryptography] Recommendations for short AES passphrases
 
ıuoʎ
 - [Cryptography] Recommendations for short AES passphrases
 
grarpamp
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
John Denker
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
Michael Kjörling
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
Kent Borg
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
John Denker
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
Michael Kjörling
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
Kent Borg
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
Kevin W. Wall
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
Michael Kjörling
 - [Cryptography] Recommendations in lieu of short AES passphrases
 
Kent Borg
 - [Cryptography] Secure erasure
 
John Denker
 - [Cryptography] Secure erasure
 
Arnold Reinhold
 - [Cryptography] Secure erasure
 
Henry Baker
 - [Cryptography] Secure erasure
 
John Denker
 - [Cryptography] Secure erasure
 
Kent Borg
 - [Cryptography] Secure erasure
 
John Denker
 - [Cryptography] Secure erasure
 
Ray Dillinger
 - [Cryptography] Secure erasure
 
Peter Gutmann
 - [Cryptography] Secure erasure
 
Jerry Leichter
 - [Cryptography] Secure erasure
 
Ralf Senderek
 - [Cryptography] Secure erasure
 
Henry Baker
 - [Cryptography] Secure erasure
 
Kent Borg
 - [Cryptography] Secure erasure
 
Patrick Pelletier
 - [Cryptography] Secure erasure
 
Jerry Leichter
 - [Cryptography] Secure erasure
 
John Denker
 - [Cryptography] Secure erasure
 
Aram Perez
 - [Cryptography] Secure erasure
 
Ray Dillinger
 - [Cryptography] Secure erasure
 
Peter Gutmann
 - [Cryptography] Secure erasure
 
Ralf Senderek
 - [Cryptography] Secure erasure
 
Jerry Leichter
 - [Cryptography] Secure erasure
 
Ralf Senderek
 - [Cryptography] Secure erasure
 
Jerry Leichter
 - [Cryptography] Secure erasure
 
Ralf Senderek
 - [Cryptography] Secure erasure
 
Ray Dillinger
 - [Cryptography] Secure erasure
 
Stephen Farrell
 - [Cryptography] Secure erasure
 
alex at alten.org
 - [Cryptography] Secure erasure
 
Ralf Senderek
 - [Cryptography] Secure erasure
 
Peter Gutmann
 - [Cryptography] Secure erasure
 
Stephen Farrell
 - [Cryptography] Secure erasure
 
Peter Gutmann
 - [Cryptography] Secure erasure
 
Watson Ladd
 - [Cryptography] Secure erasure
 
Jerry Leichter
 - [Cryptography] Secure erasure
 
Tom Mitchell
 - [Cryptography] Secure erasure
 
Henry Baker
 - [Cryptography] Secure erasure
 
Ron Garret
 - [Cryptography] Secure erasure
 
Kent Borg
 - [Cryptography] Secure erasure
 
Henry Baker
 - [Cryptography] Secure erasure
 
Jerry Leichter
 - [Cryptography] Secure erasure
 
alex at alten.org
 - [Cryptography] Secure erasure
 
Ray Dillinger
 - [Cryptography] Secure erasure
 
Tony Arcieri
 - [Cryptography] Secure erasure
 
Henry Baker
 - [Cryptography] Secure erasure
 
Kent Borg
 - [Cryptography] Secure erasure
 
Peter Gutmann
 - [Cryptography] Secure erasure
 
Richard Outerbridge
 - [Cryptography] Secure erasure
 
alex at alten.org
 - [Cryptography] Secure erasure
 
Henry Baker
 - [Cryptography] Secure erasure
 
Bill Frantz
 - [Cryptography] Secure erasure
 
Jerry Leichter
 - [Cryptography] Secure erasure
 
Bill Frantz
 - [Cryptography] Secure erasure - Ada may be a solution.
 
Ray Dillinger
 - [Cryptography] Secure erasure in C.
 
Ray Dillinger
 - [Cryptography] Secure erasure in C.
 
Harlan Lieberman-Berg
 - [Cryptography] Secure erasure in C.
 
Tony Arcieri
 - [Cryptography] Secure erasure in C.
 
Phillip Hallam-Baker
 - [Cryptography] Secure erasure in C.
 
Kent Borg
 - [Cryptography] Secure erasure in C.
 
Patrick
 - [Cryptography] Secure erasure in C.
 
Ray Dillinger
 - [Cryptography] Secure erasure in C.
 
Salz, Rich
 - [Cryptography] Secure erasure in C.
 
Patrick Pelletier
 - [Cryptography] Secure erasure in C.
 
Phillip Hallam-Baker
 - [Cryptography]  Secure erasure in C.
 
Tom Mitchell
 - [Cryptography] Secure erasure in C.
 
Jerry Leichter
 - [Cryptography] Secure erasure in C.
 
Patrick Pelletier
 - [Cryptography] Secure erasure in C.
 
Ray Dillinger
 - [Cryptography] Secure erasure in C.
 
Ray Dillinger
 - [Cryptography] Secure erasure in C.
 
Ben Laurie
 - [Cryptography] Secure erasure in C.
 
Christian Huitema
 - [Cryptography] Secure erasure in C.
 
Henry Baker
 - [Cryptography] Secure erasure in C.
 
Henry Baker
 - [Cryptography] Secure erasure in C.
 
Benjamin Kreuter
 - [Cryptography] Secure erasure in C.
 
Tony Arcieri
 - [Cryptography] Secure erasure in C.
 
Ray Dillinger
 - [Cryptography] Secure erasure in C.
 
Henry Baker
 - [Cryptography] Secure erasure in C.
 
Tom Mitchell
 - [Cryptography] Secure erasure in C.
 
Jerry Leichter
 - [Cryptography] Secure erasure in C.
 
Tom Mitchell
 - [Cryptography] Secure erasure in C.
 
Kent Borg
 - [Cryptography] Secure erasure in C.
 
Peter Gutmann
 - [Cryptography] Spooky quantum radar at a distance
 
Henry Baker
 - [Cryptography] Spooky quantum radar at a distance
 
Peter Gutmann
 - [Cryptography] Spooky quantum radar at a distance
 
Natanael
 - [Cryptography] Spooky quantum radar at a distance
 
Dave Horsfall
 - [Cryptography] Spooky quantum radar at a distance
 
Jerry Leichter
 - [Cryptography] Spooky quantum radar at a distance
 
Natanael
 - [Cryptography] Spooky quantum radar at a distance
 
Viktor Dukhovni
 - [Cryptography] Spooky quantum radar at a distance
 
dj at deadhat.com
 - [Cryptography] Spooky quantum radar at a distance
 
John Denker
 - [Cryptography] Spooky quantum radar at a distance
 
Tom Mitchell
 - [Cryptography] Spooky quantum radar at a distance
 
Watson Ladd
 - [Cryptography] Spooky quantum radar at a distance
 
Ron Garret
 - [Cryptography] Spooky quantum radar at a distance
 
Jerry Leichter
 - [Cryptography] Spooky quantum radar at a distance
 
Henry Baker
 - [Cryptography] Spooky quantum radar at a distance
 
John Denker
 - [Cryptography] Strong DNS Names
 
Phill
 - [Cryptography] Strong DNS Names
 
Natanael
 - [Cryptography] Strong DNS Names
 
Viktor Dukhovni
 - [Cryptography] Strong DNS Names
 
Ralf Senderek
 - [Cryptography] Strong DNS Names
 
Donald Eastlake
 - [Cryptography] Strong DNS Names
 
Tom Mitchell
 - [Cryptography] Strong DNS Names
 
Christian Huitema
 - [Cryptography] Strong DNS Names
 
Phillip Hallam-Baker
 - [Cryptography] Strong DNS Names
 
Adam Sampson
 - [Cryptography] Strong DNS Names
 
Tom Mitchell
 - [Cryptography] Strong DNS Names
 
Dave Horsfall
 - [Cryptography] Strong DNS Names
 
Viktor Dukhovni
 - [Cryptography] Threat Model: Bluetooth tracking beacons
 
Henry Baker
 - [Cryptography] Threat Model: Bluetooth tracking beacons
 
Natanael
 - [Cryptography] Threat Model: Bluetooth tracking beacons
 
Kent Borg
 - [Cryptography] Threat Model: Bluetooth tracking beacons
 
Tom Mitchell
 - [Cryptography] Threat Model: Bluetooth tracking beacons
 
Natanael
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Thierry Moreau
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Ray Dillinger
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Thierry Moreau
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Bill Cox
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Ray Dillinger
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Bob Wilson
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Bill Cox
 - [Cryptography] True RNG: elementary particle noise sensed with	surprisingly simple electronics
 
Jerry Leichter
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Thierry Moreau
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Thierry Moreau
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
dj at deadhat.com
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Ray Dillinger
 - [Cryptography] True RNG: elementary particle noise sensed with	surprisingly simple electronics
 
Jerry Leichter
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
sebastien riou
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Kevin W. Wall
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
David Johnston
 - [Cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics
 
Bill Cox
 - [Cryptography] Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Georgi Guninski
 - [Cryptography] Two distinct DSA keys sign a file with the same signature. Is this repudiation issue?
 
Georgi Guninski
 - [Cryptography] Two distinct DSA keys sign a file with the same	signature. Is this repudiation issue?
 
Viktor Dukhovni
 - [Cryptography] Use Linux for its security
 
Jerry Leichter
 - [Cryptography] Use Linux for its security
 
Ralf Senderek
 - [Cryptography] Use Linux for its security
 
Ron Garret
 - [Cryptography] Use Linux for its security
 
Jerry Leichter
 - [Cryptography] Use Linux for its security
 
Phillip Hallam-Baker
 - [Cryptography] Use Linux for its security
 
Patrick Chkoreff
 - [Cryptography] Use Linux for its security
 
Bill Frantz
 - [Cryptography] Use Linux for its security
 
Ray Dillinger
 - [Cryptography] Use Linux for its security
 
J.M. Porup
 - [Cryptography] Use Linux for its security
 
Kent Borg
 - [Cryptography] Use Linux for its security
 
Jason Cooper
 - [Cryptography] Use Linux for its security
 
Theodore Ts'o
 - [Cryptography] Use Linux for its security
 
Ray Dillinger
 - [Cryptography] Use Linux for its security
 
Ralf Senderek
 - [Cryptography] Use Linux for its security
 
Dave Horsfall
 - [Cryptography] Use Linux for its security
 
J.M. Porup
 - [Cryptography] Use Linux for its security
 
Ray Dillinger
 - [Cryptography] Use Linux for its security
 
Henry Baker
 - [Cryptography] Use Linux for its security
 
Theodore Ts'o
 - [Cryptography] Well defined architectures, was Secure erasure
 
John Levine
 - [Cryptography] Why TLS? Why not modern authenticated D-H exchange?
 
Thierry Moreau
 - [Cryptography] Widest Rainbow Table?
 
grarpamp
 - [Cryptography] WoSign CA in trouble with at least Firefox...
 
Viktor Dukhovni
 - [Cryptography] Yahoo is sued for gross negligence over huge hacking
 
Georgi Guninski
 - [Cryptography] Yahoo is sued for gross negligence over huge	hacking
 
Kevin W. Wall
 - [Cryptography] Yahoo is sued for gross negligence over huge hacking
 
Bill Stewart
 - [Cryptography] Yahoo is sued for gross negligence over huge hacking
 
Georgi Guninski
 - [Cryptography] Yahoo is sued for gross negligence over huge	hacking
 
Allen
 - [Cryptography] Yahoo is sued for gross negligence over huge	hacking
 
John Levine
 - [Cryptography] Yahoo is sued for gross negligence over huge hacking
 
Ray Dillinger
 - [Cryptography] Yahoo is sued for gross negligence over huge	hacking
 
Phillip Hallam-Baker
 - [Cryptography] Yahoo is sued for gross negligence over huge hacking
 
Georgi Guninski
    
 
    
      Last message date: 
       Fri Sep 30 21:07:27 EDT 2016
    Archived on: Sat Oct  1 03:40:04 EDT 2016
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).