September 2019 Archives by date
Starting: Mon Sep 2 14:41:47 EDT 2019
Ending: Mon Sep 30 20:14:46 EDT 2019
Messages: 96
- [Cryptography] "Entropy as a Service: A New Resource for Secure Development"
John-Mark Gurney
- [Cryptography] Worthwhile survey paper on proof engineering for formal verification
Perry E. Metzger
- [Cryptography] The best TRNG architecture, comming soon?
Tom Mitchell
- [Cryptography] The best TRNG architecture, comming soon?
james hughes
- [Cryptography] Lockdown copyright survey paper on proof engineering
John Gilmore
- [Cryptography] Lockdown copyright survey paper on proof engineering
Perry E. Metzger
- [Cryptography] Shouldn’t root certificates switch to McEliece?
Ryan Carboni
- [Cryptography] Shouldn’t root certificates switch to McEliece?
Perry E. Metzger
- [Cryptography] Shouldn’t root certificates switch to McEliece?
Matt Palmer
- [Cryptography] decentralized distributed ledger that can support fast transactions and new applications
maria hoistas
- [Cryptography] Shouldn’t root certificates switch to McEliece?
John Levine
- [Cryptography] Shouldn’t root certificates switch to McEliece?
Perry E. Metzger
- [Cryptography] Shouldn’t root certificates switch to McEliece?
Tom Mitchell
- [Cryptography] Shouldn’t root certificates switch to McEliece?
Ryan Carboni
- [Cryptography] Halo: Recursive Proof Composition without a Trusted Setup
Alfie John
- [Cryptography] Halo: Recursive Proof Composition without a Trusted Setup
jamesd at echeque.com
- [Cryptography] TRNGs as open source design semiconductors
Ken McCall
- [Cryptography] Need some help regaining access to a server
Ron Garret
- [Cryptography] Need some help regaining access to a server
Jeremy Stanley
- [Cryptography] Need some help regaining access to a server
STeve Andre'
- [Cryptography] TRNGs as open source design semiconductors
Joachim Strömbergson
- [Cryptography] TRNGs as open source design semiconductors
Jerry Leichter
- [Cryptography] Need some help regaining access to a server
Ron Garret
- [Cryptography] TRNGs as open source design semiconductors
iang
- [Cryptography] TRNGs as open source design semiconductors
Bill Frantz
- [Cryptography] Need some help regaining access to a server
John Levine
- [Cryptography] TRNGs as open source design semiconductors
Peter Gutmann
- [Cryptography] TRNGs as open source design semiconductors
Andrew P. Lentvorski
- [Cryptography] Need some help regaining access to a server
Ron Garret
- [Cryptography] TRNGs as open source design semiconductors
Peter Gutmann
- [Cryptography] TRNGs as open source design semiconductors
Dave Horsfall
- [Cryptography] TRNGs as open source design semiconductors
Bill Frantz
- [Cryptography] TRNGs as open source design semiconductors
Ray Dillinger
- [Cryptography] TRNGs as open source design semiconductors
Ray Dillinger
- [Cryptography] TRNGs as open source design semiconductors
Bill Frantz
- [Cryptography] TRNGs as open source design semiconductors
Peter Gutmann
- [Cryptography] TRNGs as open source design semiconductors
Tom Mitchell
- [Cryptography] Fwd: [fc-announce] FINAL Call for Papers: Financial Cryptography and Data Security 2020 - REMINDER: deadline for registration of submissions in two days
R. Hirschfeld
- [Cryptography] Russia carried out a 'stunning' breach of FBI communications
John Denker
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Jerry Leichter
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Jonathan Thornburg
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Tom Mitchell
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Raphaël Jacquot
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Peter Gutmann
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Henry Baker
- [Cryptography] TRNGs as open source design semiconductors
Jon Callas
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Bill Frantz
- [Cryptography] TRNGs as open source design semiconductors
Arnold Reinhold
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Dave Horsfall
- [Cryptography] Fwd: How much data should Mesh Services see?
Phillip Hallam-Baker
- [Cryptography] Google's quantum computing effort
Udhay Shankar N
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Ryan Carboni
- [Cryptography] Quantum Supremacy Achieved
Ryan Carboni
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Salz, Rich
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
Jerry Leichter
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Henry Baker
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
John Levine
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
Jerry Leichter
- [Cryptography] "How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts"
Jerry Leichter
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
John Young
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Ryan Carboni
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
Phillip Hallam-Baker
- [Cryptography] Presentation for affiliated events from Crypto2019 - are they available anywhere?
Ondrej Mikle
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
Tom Mitchell
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
Dave Howe
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Salz, Rich
- [Cryptography] NSA Cyber Command Authorized to Implant Malicious Software
John Young
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Bill Frantz
- [Cryptography] Crown Sterling debunked
Phillip Hallam-Baker
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
John-Mark Gurney
- [Cryptography] Crown Sterling debunked
Phillip Hallam-Baker
- [Cryptography] "How Long Will Unbreakable Commercial Encryption Last?"
james hughes
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Ryan Carboni
- [Cryptography] Crown Sterling debunked
Viktor Dukhovni
- [Cryptography] Happy birthday, James Ellis!
Dave Horsfall
- [Cryptography] "Exclusive: Russia carried out a 'stunning' breach of FBI communications system, escalating the spy game on U.S. soil"
Dave Horsfall
- [Cryptography] Rosetta Stone
Dave Horsfall
- [Cryptography] From Cryptography to Botany.
Gerard Cheshire
- [Cryptography] Etica neutral protocol for medical research
Kevin Wadjibadé
- [Cryptography] Encryption and anonymity as top tools for images of child sexual abuse
John Young
- [Cryptography] "Strong" passwords too clever by half...
Henry Baker
- [Cryptography] "Strong" passwords too clever by half...
Udhay Shankar N
- [Cryptography] Encryption and anonymity as top tools for images of child sexual abuse
Tom Mitchell
- [Cryptography] "Strong" passwords too clever by half...
Natanael
- [Cryptography] Crown Sterling debunked
Stephan Neuhaus
- [Cryptography] Crown Sterling debunked
Viktor Dukhovni
- [Cryptography] Encryption and anonymity as top tools for images of child sexual abuse
Peter Fairbrother
- [Cryptography] "Strong" passwords too clever by half...
Bill Cox
- [Cryptography] Encryption and anonymity as top tools for images of child sexual abuse
Henry Baker
- [Cryptography] "Strong" passwords too clever by half...
Chris Kuethe
- [Cryptography] Encryption and anonymity as top tools for images of child sexual abuse
Dave Horsfall
- [Cryptography] "Strong" passwords too clever by half...
Dave Horsfall
- [Cryptography] "Strong" passwords too clever by half...
John Young
- [Cryptography] "Strong" passwords too clever by half...
Viktor Dukhovni
- [Cryptography] "Strong" passwords too clever by half...
alan at clueserver.org
- [Cryptography] Encryption and anonymity as top tools for images of child sexual abuse
Alfie John
Last message date:
Mon Sep 30 20:14:46 EDT 2019
Archived on: Tue Oct 1 18:36:45 EDT 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).