March 2017 Archives by date
      
      Starting: Wed Mar  1 00:59:22 EST 2017
         Ending: Fri Mar 31 04:28:46 EDT 2017
         Messages: 249
     
- [Cryptography] XTS mode IV generation
 
Jan Dušátko
- [Cryptography] ADMIN: Jamming the jammers conversation.
 
Perry E. Metzger
- [Cryptography] Improvements to RNG seeding in Linux 4.10
 
Ard Biesheuvel
- [Cryptography] Google announces practical SHA-1 collision attack
 
Mark Steward
- [Cryptography] On New York's new "Cybersecurity Requirements for Financial Services Companies"
 
Perry E. Metzger
- [Cryptography] Google announces practical SHA-1 collision attack
 
Phillip Hallam-Baker
- [Cryptography] cryptography Digest, Vol 47, Issue 1
 
Nemo
- [Cryptography] Google announces practical SHA-1 collision attack
 
Mark Steward
- [Cryptography] On New York's new "Cybersecurity Requirements for Financial Services Companies"
 
Henry Baker
- [Cryptography] TPM and SHA-1
 
Perry E. Metzger
- [Cryptography] Bizarre "latent entropy" kernel patch
 
John Gilmore
- [Cryptography] On New York's new "Cybersecurity Requirements for Financial Services Companies"
 
Ray Dillinger
- [Cryptography] cryptography Digest, Vol 47, Issue 1
 
Ray Dillinger
- [Cryptography] [FORGED] Re: Google announces practical SHA-1 collision attack
 
Peter Gutmann
- [Cryptography] [FORGED] Re:  cryptography Digest, Vol 47,	Issue 1
 
Peter Gutmann
- [Cryptography] Google announces practical SHA-1 collision attack
 
Peter Todd
- [Cryptography] formal verification +- resource exhaustion
 
Nemo
- [Cryptography] formal verification +- resource exhaustion
 
Peter Gutmann
- [Cryptography] TPM and SHA-1
 
Peter Gutmann
- [Cryptography] formal verification +- resource exhaustion
 
Nemo
- [Cryptography] [FORGED] Re: Google announces practical SHA-1 collision attack
 
Mark Steward
- [Cryptography] Bizarre "latent entropy" kernel patch
 
Ray Dillinger
- [Cryptography] [FORGED] Re: Google announces practical SHA-1 collision attack
 
Peter Gutmann
- [Cryptography] formal verification +- resource exhaustion
 
Peter Gutmann
- [Cryptography] [FORGED] Re: Google announces practical SHA-1 collision attack
 
Alexandre Anzala-Yamajako
- [Cryptography] Bizarre "latent entropy" kernel patch
 
Max R.D. Parmer
- [Cryptography] Signing "random garbage" with someone else's public	key
 
Georgi Guninski
- [Cryptography] Bizarre "latent entropy" kernel patch
 
Jerry Leichter
- [Cryptography] Bluetooth "smart condom" w/uUSB port
 
Henry Baker
- [Cryptography] formal verification +- resource exhaustion
 
James A. Donald
- [Cryptography] Signing "random garbage" with someone else's public key
 
James A. Donald
- [Cryptography] ADMIN: Reminders
 
Perry E. Metzger
- [Cryptography] TPM and SHA-1
 
Perry E. Metzger
- [Cryptography] TPM and SHA-1
 
Darren Moffat
- [Cryptography] TPM and SHA-1
 
Jeremy Stanley
- [Cryptography] Uber "Greyball"-ed city authorities w/fake screens
 
Henry Baker
- [Cryptography] TPM and SHA-1
 
james hughes
- [Cryptography] TPM and SHA-1
 
Ben Laurie
- [Cryptography] TPM and SHA-1
 
james hughes
- [Cryptography] Secret Handshake problem.
 
James A. Donald
- [Cryptography] Secret Handshake problem.
 
John Denker
- [Cryptography] Mode 5
 
Rui Paulo
- [Cryptography] Secret Handshake problem.
 
Joseph Kilcullen
- [Cryptography] Secret Handshake problem.
 
Joseph Kilcullen
- [Cryptography] Mark XIIa Mode 5 IFF
 
John Denker
- [Cryptography] Secret Handshake problem.
 
Peter Gutmann
- [Cryptography] Secret Handshake problem.
 
Benjamin Kreuter
- [Cryptography] Secret Handshake problem.
 
Alfie John
- [Cryptography] In ECDSA, without knowing priv. key and any signature one can sign random garbage
 
Georgi Guninski
- [Cryptography] Can someone explain small order subgroups?
 
Phillip Hallam-Baker
- [Cryptography] Can someone explain small order subgroups?
 
Viktor Dukhovni
- [Cryptography] In ECDSA, without knowing priv. key and any signature one can sign random garbage
 
Phillip Hallam-Baker
- [Cryptography] Crypto best practices
 
Patrick Chkoreff
- [Cryptography] Crypto best practices
 
Hanno Böck
- [Cryptography] Crypto best practices
 
Hanno Böck
- [Cryptography] Crypto best practices
 
Tom Mitchell
- [Cryptography] Crypto best practices
 
Ryan Carboni
- [Cryptography] In ECDSA, without knowing priv. key and any signature one can sign random garbage
 
Natanael
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] encrypting bcrypt hashes
 
Natanael
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] encrypting bcrypt hashes
 
Jonathan Thornburg
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] encrypting bcrypt hashes
 
John Denker
- [Cryptography] encrypting bcrypt hashes
 
Ray Dillinger
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] encrypting bcrypt hashes
 
Ron Garret
- [Cryptography] encrypting bcrypt hashes
 
Ron Garret
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] encrypting bcrypt hashes
 
Mark Steward
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] jammers, nor not
 
Ryan Carboni
- [Cryptography] In ECDSA, without knowing priv. key and any signature one can sign random garbage
 
Georgi Guninski
- [Cryptography] Crypto best practices
 
Arnold Reinhold
- [Cryptography] Crypto best practices
 
Hanno Böck
- [Cryptography] Crypto best practices
 
Jerry Leichter
- [Cryptography] Crypto best practices
 
Thierry Moreau
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
 
Tom Mitchell
- [Cryptography] encrypting bcrypt hashes
 
Ray Dillinger
- [Cryptography] Crypto best practices
 
John Denker
- [Cryptography] ADMIN: Anyone at Microsoft able to lend some	assistance?
 
Perry E. Metzger
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
 
Jon Callas
- [Cryptography] Has formal verification actually been useful in the	real world?
 
James A. Donald
- [Cryptography] Fwd: SANS NewsBites Vol. 19 Num. 020 :Industry to	Government: "Share More"
 
Bill Frantz
- [Cryptography] Has formal verification actually been useful in the real world?
 
mok-kong shen
- [Cryptography] ADMIN: DMARC users getting their From: address	rewritten
 
Perry E. Metzger
- [Cryptography] Has formal verification actually been useful in the real world?
 
Perry E. Metzger
- [Cryptography] Has formal verification actually been useful in the real world?
 
Henry Baker
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
 
Richard Outerbridge
- [Cryptography] encrypting bcrypt hashes
 
Mark Steward
- [Cryptography] Has formal verification actually been useful in the real world?
 
Perry E. Metzger
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
 
Tom Mitchell
- [Cryptography] encrypting bcrypt hashes
 
Tom Mitchell
- [Cryptography] Has formal verification actually been useful in the real world?
 
Jim Gettys
- [Cryptography] Has formal verification actually been useful in	the real world?
 
Bill Frantz
- [Cryptography] Crypto best practices
 
Peter Gutmann
- [Cryptography] Secret Handshake problem.
 
Ben Laurie
- [Cryptography] encrypting bcrypt hashes
 
Arnold Reinhold
- [Cryptography] Secret Handshake problem.
 
Jerry Leichter
- [Cryptography] Secret Handshake problem.
 
Jerry Leichter
- [Cryptography] Physical Security Device from 1680
 
Jim Windle
- [Cryptography] On New York's new "Cybersecurity Requirements for Financial Services Companies"
 
iang
- [Cryptography] Secret Handshake problem.
 
Peter Gutmann
- [Cryptography] USB firewall/condom HW/SW
 
Henry Baker
- [Cryptography] encrypting bcrypt hashes
 
Robin Wood
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
 
Dave Horsfall
- [Cryptography] USB firewall/condom HW/SW
 
Dave Horsfall
- [Cryptography] USB firewall/condom HW/SW
 
Ron Garret
- [Cryptography] USB firewall/condom HW/SW
 
Thierry Moreau
- [Cryptography] USB firewall/condom HW/SW
 
Bertrand Mollinier Toublet
- [Cryptography] USB firewall/condom HW/SW
 
Jerry Leichter
- [Cryptography] Programmable HPstyle RPN calculators (not HP).
 
Richard Outerbridge
- [Cryptography] encrypting bcrypt hashes
 
Tom Mitchell
- [Cryptography] USB firewall/condom HW/SW
 
Tom Mitchell
- [Cryptography] Fwd: SANS NewsBites Vol. 19 Num. 020 :Industry to Government: "Share More"
 
Tom Mitchell
- [Cryptography] USB firewall/condom HW/SW
 
Bill Frantz
- [Cryptography] USB firewall/condom HW/SW
 
Dave Horsfall
- [Cryptography] USB firewall/condom HW/SW
 
John-Mark Gurney
- [Cryptography] encrypting bcrypt hashes
 
Mark Steward
- [Cryptography] Crypto best practices
 
Hanno Böck
- [Cryptography] USB firewall/condom HW/SW
 
Jerry Leichter
- [Cryptography] USB firewall/condom HW/SW
 
Peter Gutmann
- [Cryptography] Crypto best practices
 
Peter Gutmann
- [Cryptography] Crypto best practices
 
Dennis E. Hamilton
- [Cryptography] Crypto best practices
 
Ralf Senderek
- [Cryptography] Crypto best practices
 
Hanno Böck
- [Cryptography] Crypto best practices
 
Peter Gutmann
- [Cryptography] Fw:  Crypto best practices
 
Peter Gutmann
- [Cryptography] encrypting bcrypt hashes
 
Arnold Reinhold
- [Cryptography] NSA says China's supercomputing advances put US at	risk
 
Henry Baker
- [Cryptography] NSA says China's supercomputing advances put US	at risk
 
John Ioannidis
- [Cryptography] NSA says China's supercomputing advances put US	at	risk
 
Peter Gutmann
- [Cryptography] Crypto best practices
 
Ray Dillinger
- [Cryptography] Using SGX to defeat SGX.
 
Ray Dillinger
- [Cryptography] Crypto best practices
 
Peter Gutmann
- [Cryptography] Crypto best practices
 
Ron Garret
- [Cryptography] NSA says China's supercomputing advances put US at risk
 
Christian Huitema
- [Cryptography] Crypto best practices
 
Christian Huitema
- [Cryptography] Crypto best practices
 
Peter Gutmann
- [Cryptography] NSA says China's supercomputing advances put US	at risk
 
Jerry Leichter
- [Cryptography] NSA says China's supercomputing advances put US at risk
 
James A. Donald
- [Cryptography] NSA says China's supercomputing advances put US	at risk
 
Tom Mitchell
- [Cryptography] Crypto best practices
 
Ray Dillinger
- [Cryptography] NSA says China's supercomputing advances put US at risk
 
Henry Baker
- [Cryptography] Crypto best practices
 
John-Mark Gurney
- [Cryptography] Crypto best practices
 
Jerry Leichter
- [Cryptography] Crypto best practices
 
Ralf Senderek
- [Cryptography] Crypto best practices
 
Peter Gutmann
- [Cryptography] Crypto best practices
 
Ralf Senderek
- [Cryptography] Crypto best practices
 
Arnold Reinhold
- [Cryptography] Crypto best practices
 
Jerry Leichter
- [Cryptography] Crypto best practices
 
Henry Baker
- [Cryptography] Crypto best practices
 
John-Mark Gurney
- [Cryptography] Crypto best practices
 
Watson Ladd
- [Cryptography] Crypto best practices
 
Ron Garret
- [Cryptography] Crypto best practices
 
iang
- [Cryptography] Crypto best practices
 
Sidney Markowitz
- [Cryptography] Crypto best practices
 
Kristian Gjøsteen
- [Cryptography] Crypto best practices
 
Peter Gutmann
- [Cryptography] Crypto best practices
 
Peter Gutmann
- [Cryptography] Crypto best practices
 
Natanael
- [Cryptography] [FORGED] Re:  Crypto best practices
 
Peter Gutmann
- [Cryptography] [FORGED] Re:  Crypto best practices
 
Natanael
- [Cryptography] Crypto best practices
 
Kristian Gjøsteen
- [Cryptography] Crypto best practices
 
Natanael
- [Cryptography] Crypto best practices
 
Phillip Hallam-Baker
- [Cryptography] [FORGED] Re: Crypto best practices
 
Patrick Chkoreff
- [Cryptography] Crypto best practices
 
Jerry Leichter
- [Cryptography] [FORGED] Re: Crypto best practices
 
Patrick Chkoreff
- [Cryptography] [FORGED] Re: Crypto best practices
 
grarpamp
- [Cryptography] Spice Mix Mode.
 
Ray Dillinger
- [Cryptography] Blockchain scalability
 
Jerry Leichter
- [Cryptography] [FORGED] Re: Crypto best practices
 
Ray Dillinger
- [Cryptography] 比特币之父的声明(公开信息)
 
叶振东
- [Cryptography] Crypto best practices
 
James A. Donald
- [Cryptography] Crypto best practices
 
Patrick Chkoreff
- [Cryptography] My apologies for letting Chinese spam thru to the	list
 
Tamzen Cannoy
- [Cryptography] encryption + authentication - waiting - chaining (was: best practices)
 
John Denker
- [Cryptography] encryption + authentication - waiting - chaining	(was: best practices)
 
Jerry Leichter
- [Cryptography] Google distrusts Symantec for mis-issuing 30,	000 HTTPS certs
 
Henry Baker
- [Cryptography] OpenSSL working to change its license
 
Salz, Rich
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
 
William Allen Simpson
- [Cryptography] Google distrusts Symantec for mis-issuing 30,	000 HTTPS certs
 
John Levine
- [Cryptography] Google distrusts Symantec for mis-issuing  30, 000 HTTPS certs
 
Henry Baker
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
 
Peter Bowen
- [Cryptography] Google distrusts Symantec for mis-issuing 30,	000 HTTPS certs
 
Ron Garret
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
 
Ben Laurie
- [Cryptography] Google distrusts Symantec for mis-issuing  30, 000 HTTPS certs
 
Theodore Ts'o
- [Cryptography] Google distrusts Symantec for mis-issuing   30, 000 HTTPS certs
 
Henry Baker
- [Cryptography] Google distrusts Symantec for mis-issuing  30, 000 HTTPS certs
 
Thierry Moreau
- [Cryptography] Google distrusts Symantec for mis-issuing 30,	000 HTTPS certs
 
Florian Weimer
- [Cryptography] Google distrusts Symantec for mis-issuing 30, 000 HTTPS certs
 
Tom Mitchell
- [Cryptography] escalating threats to privacy
 
John Denker
- [Cryptography] UK targets WhatsApp encryption after London attack
 
Henry Baker
- [Cryptography] encryption + authentication - waiting - chaining
 
iang
- [Cryptography] "Perpetual Encryption"
 
Salz, Rich
- [Cryptography] "Perpetual Encryption"
 
Ron Garret
- [Cryptography] "Perpetual Encryption"
 
Bertrand Mollinier Toublet
- [Cryptography] "Perpetual Encryption"
 
james hughes
- [Cryptography] "Perpetual Encryption"
 
Allen
- [Cryptography] "Perpetual Encryption"
 
Ralf Senderek
- [Cryptography] UK targets WhatsApp encryption after London	attack
 
Phillip Hallam-Baker
- [Cryptography] "Perpetual Encryption"
 
Patrick Chkoreff
- [Cryptography] "Perpetual Encryption"
 
Bill Frantz
- [Cryptography] "Perpetual Encryption"
 
Allen
- [Cryptography] escalating threats to privacy
 
Tom Mitchell
- [Cryptography] "Perpetual Encryption"
 
Philipp Gühring
- [Cryptography] AES related issue
 
Philipp Gühring
- [Cryptography] "Perpetual Encryption"
 
Dave Howe
- [Cryptography] escalating threats to privacy
 
Dave Howe
- [Cryptography] "Perpetual Encryption"
 
Patrick Chkoreff
- [Cryptography] "Perpetual Encryption"
 
Patrick Chkoreff
- [Cryptography] "Perpetual Encryption"
 
Phillip Hallam-Baker
- [Cryptography] AES related issue
 
John Denker
- [Cryptography] "Perpetual Encryption"
 
Allen
- [Cryptography] "Perpetual Encryption"
 
Bill Cox
- [Cryptography] "Perpetual Encryption"
 
Ron Garret
- [Cryptography] AES related issue
 
Bart Preneel
- [Cryptography] "Perpetual Encryption"
 
Bill Cox
- [Cryptography] "Perpetual Encryption" (or why bother?)
 
Viktor Dukhovni
- [Cryptography] "Perpetual Encryption"
 
Mark Steward
- [Cryptography] DJI calls for drone IFF
 
Henry Baker
- [Cryptography] escalating threats to privacy
 
John Denker
- [Cryptography] stegophone (was: escalating threats to privacy)
 
John Denker
- [Cryptography] Science of Security Award, last call
 
dan at geer.org
- [Cryptography] "Perpetual Encryption"
 
Phillip Hallam-Baker
- [Cryptography] DJI calls for drone IFF
 
Ben Laurie
- [Cryptography] DJI calls for drone IFF
 
Henry Baker
- [Cryptography] Science of Security Award, last call
 
Henry Baker
- [Cryptography] "Perpetual Encryption"
 
Dennis E. Hamilton
- [Cryptography] escalating threats to privacy
 
Jerry Leichter
- [Cryptography] "Perpetual Encryption"
 
Allen
- [Cryptography] stegophone (was: escalating threats to privacy)
 
Michael Marking
- [Cryptography] DJI calls for drone IFF
 
Jerry Leichter
- [Cryptography] stegophone (was: escalating threats to privacy)
 
Richard Outerbridge
- [Cryptography] DJI calls for drone IFF
 
Dave Horsfall
- [Cryptography] DJI calls for drone IFF
 
grarpamp
- [Cryptography] stegophone
 
Dave Howe
- [Cryptography] Removal of spaces in NIST Draft SP-800-63B
 
Arnold Reinhold
- [Cryptography] UK targets WhatsApp encryption after London	attack
 
Bumpa Dump
- [Cryptography] Removal of spaces in NIST Draft SP-800-63B
 
Patrick Chkoreff
- [Cryptography] Removal of spaces in NIST Draft SP-800-63B
 
Tom Mitchell
- [Cryptography] escalating threats to privacy
 
Henry Baker
- [Cryptography] stegophone
 
Florian Weimer
- [Cryptography] escalating threats to privacy
 
Florian Weimer
- [Cryptography] stegophone
 
John Denker
- [Cryptography] Version 2 of my natural language steganographical	scheme released
 
mok-kong shen
    
      Last message date: 
       Fri Mar 31 04:28:46 EDT 2017
    Archived on: Fri Mar 31 08:49:21 EDT 2017
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).