March 2017 Archives by date
Starting: Wed Mar 1 00:59:22 EST 2017
Ending: Fri Mar 31 04:28:46 EDT 2017
Messages: 249
- [Cryptography] XTS mode IV generation
Jan Dušátko
- [Cryptography] ADMIN: Jamming the jammers conversation.
Perry E. Metzger
- [Cryptography] Improvements to RNG seeding in Linux 4.10
Ard Biesheuvel
- [Cryptography] Google announces practical SHA-1 collision attack
Mark Steward
- [Cryptography] On New York's new "Cybersecurity Requirements for Financial Services Companies"
Perry E. Metzger
- [Cryptography] Google announces practical SHA-1 collision attack
Phillip Hallam-Baker
- [Cryptography] cryptography Digest, Vol 47, Issue 1
Nemo
- [Cryptography] Google announces practical SHA-1 collision attack
Mark Steward
- [Cryptography] On New York's new "Cybersecurity Requirements for Financial Services Companies"
Henry Baker
- [Cryptography] TPM and SHA-1
Perry E. Metzger
- [Cryptography] Bizarre "latent entropy" kernel patch
John Gilmore
- [Cryptography] On New York's new "Cybersecurity Requirements for Financial Services Companies"
Ray Dillinger
- [Cryptography] cryptography Digest, Vol 47, Issue 1
Ray Dillinger
- [Cryptography] [FORGED] Re: Google announces practical SHA-1 collision attack
Peter Gutmann
- [Cryptography] [FORGED] Re: cryptography Digest, Vol 47, Issue 1
Peter Gutmann
- [Cryptography] Google announces practical SHA-1 collision attack
Peter Todd
- [Cryptography] formal verification +- resource exhaustion
Nemo
- [Cryptography] formal verification +- resource exhaustion
Peter Gutmann
- [Cryptography] TPM and SHA-1
Peter Gutmann
- [Cryptography] formal verification +- resource exhaustion
Nemo
- [Cryptography] [FORGED] Re: Google announces practical SHA-1 collision attack
Mark Steward
- [Cryptography] Bizarre "latent entropy" kernel patch
Ray Dillinger
- [Cryptography] [FORGED] Re: Google announces practical SHA-1 collision attack
Peter Gutmann
- [Cryptography] formal verification +- resource exhaustion
Peter Gutmann
- [Cryptography] [FORGED] Re: Google announces practical SHA-1 collision attack
Alexandre Anzala-Yamajako
- [Cryptography] Bizarre "latent entropy" kernel patch
Max R.D. Parmer
- [Cryptography] Signing "random garbage" with someone else's public key
Georgi Guninski
- [Cryptography] Bizarre "latent entropy" kernel patch
Jerry Leichter
- [Cryptography] Bluetooth "smart condom" w/uUSB port
Henry Baker
- [Cryptography] formal verification +- resource exhaustion
James A. Donald
- [Cryptography] Signing "random garbage" with someone else's public key
James A. Donald
- [Cryptography] ADMIN: Reminders
Perry E. Metzger
- [Cryptography] TPM and SHA-1
Perry E. Metzger
- [Cryptography] TPM and SHA-1
Darren Moffat
- [Cryptography] TPM and SHA-1
Jeremy Stanley
- [Cryptography] Uber "Greyball"-ed city authorities w/fake screens
Henry Baker
- [Cryptography] TPM and SHA-1
james hughes
- [Cryptography] TPM and SHA-1
Ben Laurie
- [Cryptography] TPM and SHA-1
james hughes
- [Cryptography] Secret Handshake problem.
James A. Donald
- [Cryptography] Secret Handshake problem.
John Denker
- [Cryptography] Mode 5
Rui Paulo
- [Cryptography] Secret Handshake problem.
Joseph Kilcullen
- [Cryptography] Secret Handshake problem.
Joseph Kilcullen
- [Cryptography] Mark XIIa Mode 5 IFF
John Denker
- [Cryptography] Secret Handshake problem.
Peter Gutmann
- [Cryptography] Secret Handshake problem.
Benjamin Kreuter
- [Cryptography] Secret Handshake problem.
Alfie John
- [Cryptography] In ECDSA, without knowing priv. key and any signature one can sign random garbage
Georgi Guninski
- [Cryptography] Can someone explain small order subgroups?
Phillip Hallam-Baker
- [Cryptography] Can someone explain small order subgroups?
Viktor Dukhovni
- [Cryptography] In ECDSA, without knowing priv. key and any signature one can sign random garbage
Phillip Hallam-Baker
- [Cryptography] Crypto best practices
Patrick Chkoreff
- [Cryptography] Crypto best practices
Hanno Böck
- [Cryptography] Crypto best practices
Hanno Böck
- [Cryptography] Crypto best practices
Tom Mitchell
- [Cryptography] Crypto best practices
Ryan Carboni
- [Cryptography] In ECDSA, without knowing priv. key and any signature one can sign random garbage
Natanael
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] encrypting bcrypt hashes
Natanael
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] encrypting bcrypt hashes
Jonathan Thornburg
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] encrypting bcrypt hashes
John Denker
- [Cryptography] encrypting bcrypt hashes
Ray Dillinger
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] encrypting bcrypt hashes
Ron Garret
- [Cryptography] encrypting bcrypt hashes
Ron Garret
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] encrypting bcrypt hashes
Mark Steward
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] jammers, nor not
Ryan Carboni
- [Cryptography] In ECDSA, without knowing priv. key and any signature one can sign random garbage
Georgi Guninski
- [Cryptography] Crypto best practices
Arnold Reinhold
- [Cryptography] Crypto best practices
Hanno Böck
- [Cryptography] Crypto best practices
Jerry Leichter
- [Cryptography] Crypto best practices
Thierry Moreau
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
Tom Mitchell
- [Cryptography] encrypting bcrypt hashes
Ray Dillinger
- [Cryptography] Crypto best practices
John Denker
- [Cryptography] ADMIN: Anyone at Microsoft able to lend some assistance?
Perry E. Metzger
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
Jon Callas
- [Cryptography] Has formal verification actually been useful in the real world?
James A. Donald
- [Cryptography] Fwd: SANS NewsBites Vol. 19 Num. 020 :Industry to Government: "Share More"
Bill Frantz
- [Cryptography] Has formal verification actually been useful in the real world?
mok-kong shen
- [Cryptography] ADMIN: DMARC users getting their From: address rewritten
Perry E. Metzger
- [Cryptography] Has formal verification actually been useful in the real world?
Perry E. Metzger
- [Cryptography] Has formal verification actually been useful in the real world?
Henry Baker
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
Richard Outerbridge
- [Cryptography] encrypting bcrypt hashes
Mark Steward
- [Cryptography] Has formal verification actually been useful in the real world?
Perry E. Metzger
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
Tom Mitchell
- [Cryptography] encrypting bcrypt hashes
Tom Mitchell
- [Cryptography] Has formal verification actually been useful in the real world?
Jim Gettys
- [Cryptography] Has formal verification actually been useful in the real world?
Bill Frantz
- [Cryptography] Crypto best practices
Peter Gutmann
- [Cryptography] Secret Handshake problem.
Ben Laurie
- [Cryptography] encrypting bcrypt hashes
Arnold Reinhold
- [Cryptography] Secret Handshake problem.
Jerry Leichter
- [Cryptography] Secret Handshake problem.
Jerry Leichter
- [Cryptography] Physical Security Device from 1680
Jim Windle
- [Cryptography] On New York's new "Cybersecurity Requirements for Financial Services Companies"
iang
- [Cryptography] Secret Handshake problem.
Peter Gutmann
- [Cryptography] USB firewall/condom HW/SW
Henry Baker
- [Cryptography] encrypting bcrypt hashes
Robin Wood
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
Dave Horsfall
- [Cryptography] USB firewall/condom HW/SW
Dave Horsfall
- [Cryptography] USB firewall/condom HW/SW
Ron Garret
- [Cryptography] USB firewall/condom HW/SW
Thierry Moreau
- [Cryptography] USB firewall/condom HW/SW
Bertrand Mollinier Toublet
- [Cryptography] USB firewall/condom HW/SW
Jerry Leichter
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
Richard Outerbridge
- [Cryptography] encrypting bcrypt hashes
Tom Mitchell
- [Cryptography] USB firewall/condom HW/SW
Tom Mitchell
- [Cryptography] Fwd: SANS NewsBites Vol. 19 Num. 020 :Industry to Government: "Share More"
Tom Mitchell
- [Cryptography] USB firewall/condom HW/SW
Bill Frantz
- [Cryptography] USB firewall/condom HW/SW
Dave Horsfall
- [Cryptography] USB firewall/condom HW/SW
John-Mark Gurney
- [Cryptography] encrypting bcrypt hashes
Mark Steward
- [Cryptography] Crypto best practices
Hanno Böck
- [Cryptography] USB firewall/condom HW/SW
Jerry Leichter
- [Cryptography] USB firewall/condom HW/SW
Peter Gutmann
- [Cryptography] Crypto best practices
Peter Gutmann
- [Cryptography] Crypto best practices
Dennis E. Hamilton
- [Cryptography] Crypto best practices
Ralf Senderek
- [Cryptography] Crypto best practices
Hanno Böck
- [Cryptography] Crypto best practices
Peter Gutmann
- [Cryptography] Fw: Crypto best practices
Peter Gutmann
- [Cryptography] encrypting bcrypt hashes
Arnold Reinhold
- [Cryptography] NSA says China's supercomputing advances put US at risk
Henry Baker
- [Cryptography] NSA says China's supercomputing advances put US at risk
John Ioannidis
- [Cryptography] NSA says China's supercomputing advances put US at risk
Peter Gutmann
- [Cryptography] Crypto best practices
Ray Dillinger
- [Cryptography] Using SGX to defeat SGX.
Ray Dillinger
- [Cryptography] Crypto best practices
Peter Gutmann
- [Cryptography] Crypto best practices
Ron Garret
- [Cryptography] NSA says China's supercomputing advances put US at risk
Christian Huitema
- [Cryptography] Crypto best practices
Christian Huitema
- [Cryptography] Crypto best practices
Peter Gutmann
- [Cryptography] NSA says China's supercomputing advances put US at risk
Jerry Leichter
- [Cryptography] NSA says China's supercomputing advances put US at risk
James A. Donald
- [Cryptography] NSA says China's supercomputing advances put US at risk
Tom Mitchell
- [Cryptography] Crypto best practices
Ray Dillinger
- [Cryptography] NSA says China's supercomputing advances put US at risk
Henry Baker
- [Cryptography] Crypto best practices
John-Mark Gurney
- [Cryptography] Crypto best practices
Jerry Leichter
- [Cryptography] Crypto best practices
Ralf Senderek
- [Cryptography] Crypto best practices
Peter Gutmann
- [Cryptography] Crypto best practices
Ralf Senderek
- [Cryptography] Crypto best practices
Arnold Reinhold
- [Cryptography] Crypto best practices
Jerry Leichter
- [Cryptography] Crypto best practices
Henry Baker
- [Cryptography] Crypto best practices
John-Mark Gurney
- [Cryptography] Crypto best practices
Watson Ladd
- [Cryptography] Crypto best practices
Ron Garret
- [Cryptography] Crypto best practices
iang
- [Cryptography] Crypto best practices
Sidney Markowitz
- [Cryptography] Crypto best practices
Kristian Gjøsteen
- [Cryptography] Crypto best practices
Peter Gutmann
- [Cryptography] Crypto best practices
Peter Gutmann
- [Cryptography] Crypto best practices
Natanael
- [Cryptography] [FORGED] Re: Crypto best practices
Peter Gutmann
- [Cryptography] [FORGED] Re: Crypto best practices
Natanael
- [Cryptography] Crypto best practices
Kristian Gjøsteen
- [Cryptography] Crypto best practices
Natanael
- [Cryptography] Crypto best practices
Phillip Hallam-Baker
- [Cryptography] [FORGED] Re: Crypto best practices
Patrick Chkoreff
- [Cryptography] Crypto best practices
Jerry Leichter
- [Cryptography] [FORGED] Re: Crypto best practices
Patrick Chkoreff
- [Cryptography] [FORGED] Re: Crypto best practices
grarpamp
- [Cryptography] Spice Mix Mode.
Ray Dillinger
- [Cryptography] Blockchain scalability
Jerry Leichter
- [Cryptography] [FORGED] Re: Crypto best practices
Ray Dillinger
- [Cryptography] 比特币之父的声明(公开信息)
叶振东
- [Cryptography] Crypto best practices
James A. Donald
- [Cryptography] Crypto best practices
Patrick Chkoreff
- [Cryptography] My apologies for letting Chinese spam thru to the list
Tamzen Cannoy
- [Cryptography] encryption + authentication - waiting - chaining (was: best practices)
John Denker
- [Cryptography] encryption + authentication - waiting - chaining (was: best practices)
Jerry Leichter
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Henry Baker
- [Cryptography] OpenSSL working to change its license
Salz, Rich
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
William Allen Simpson
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
John Levine
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Henry Baker
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Peter Bowen
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Ron Garret
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Ben Laurie
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Theodore Ts'o
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Henry Baker
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Thierry Moreau
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Florian Weimer
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
Tom Mitchell
- [Cryptography] escalating threats to privacy
John Denker
- [Cryptography] UK targets WhatsApp encryption after London attack
Henry Baker
- [Cryptography] encryption + authentication - waiting - chaining
iang
- [Cryptography] "Perpetual Encryption"
Salz, Rich
- [Cryptography] "Perpetual Encryption"
Ron Garret
- [Cryptography] "Perpetual Encryption"
Bertrand Mollinier Toublet
- [Cryptography] "Perpetual Encryption"
james hughes
- [Cryptography] "Perpetual Encryption"
Allen
- [Cryptography] "Perpetual Encryption"
Ralf Senderek
- [Cryptography] UK targets WhatsApp encryption after London attack
Phillip Hallam-Baker
- [Cryptography] "Perpetual Encryption"
Patrick Chkoreff
- [Cryptography] "Perpetual Encryption"
Bill Frantz
- [Cryptography] "Perpetual Encryption"
Allen
- [Cryptography] escalating threats to privacy
Tom Mitchell
- [Cryptography] "Perpetual Encryption"
Philipp Gühring
- [Cryptography] AES related issue
Philipp Gühring
- [Cryptography] "Perpetual Encryption"
Dave Howe
- [Cryptography] escalating threats to privacy
Dave Howe
- [Cryptography] "Perpetual Encryption"
Patrick Chkoreff
- [Cryptography] "Perpetual Encryption"
Patrick Chkoreff
- [Cryptography] "Perpetual Encryption"
Phillip Hallam-Baker
- [Cryptography] AES related issue
John Denker
- [Cryptography] "Perpetual Encryption"
Allen
- [Cryptography] "Perpetual Encryption"
Bill Cox
- [Cryptography] "Perpetual Encryption"
Ron Garret
- [Cryptography] AES related issue
Bart Preneel
- [Cryptography] "Perpetual Encryption"
Bill Cox
- [Cryptography] "Perpetual Encryption" (or why bother?)
Viktor Dukhovni
- [Cryptography] "Perpetual Encryption"
Mark Steward
- [Cryptography] DJI calls for drone IFF
Henry Baker
- [Cryptography] escalating threats to privacy
John Denker
- [Cryptography] stegophone (was: escalating threats to privacy)
John Denker
- [Cryptography] Science of Security Award, last call
dan at geer.org
- [Cryptography] "Perpetual Encryption"
Phillip Hallam-Baker
- [Cryptography] DJI calls for drone IFF
Ben Laurie
- [Cryptography] DJI calls for drone IFF
Henry Baker
- [Cryptography] Science of Security Award, last call
Henry Baker
- [Cryptography] "Perpetual Encryption"
Dennis E. Hamilton
- [Cryptography] escalating threats to privacy
Jerry Leichter
- [Cryptography] "Perpetual Encryption"
Allen
- [Cryptography] stegophone (was: escalating threats to privacy)
Michael Marking
- [Cryptography] DJI calls for drone IFF
Jerry Leichter
- [Cryptography] stegophone (was: escalating threats to privacy)
Richard Outerbridge
- [Cryptography] DJI calls for drone IFF
Dave Horsfall
- [Cryptography] DJI calls for drone IFF
grarpamp
- [Cryptography] stegophone
Dave Howe
- [Cryptography] Removal of spaces in NIST Draft SP-800-63B
Arnold Reinhold
- [Cryptography] UK targets WhatsApp encryption after London attack
Bumpa Dump
- [Cryptography] Removal of spaces in NIST Draft SP-800-63B
Patrick Chkoreff
- [Cryptography] Removal of spaces in NIST Draft SP-800-63B
Tom Mitchell
- [Cryptography] escalating threats to privacy
Henry Baker
- [Cryptography] stegophone
Florian Weimer
- [Cryptography] escalating threats to privacy
Florian Weimer
- [Cryptography] stegophone
John Denker
- [Cryptography] Version 2 of my natural language steganographical scheme released
mok-kong shen
Last message date:
Fri Mar 31 04:28:46 EDT 2017
Archived on: Fri Mar 31 08:49:21 EDT 2017
This archive was generated by
Pipermail 0.09 (Mailman edition).