Messages by Date
-
2009/07/29
Re: New Technology to Make Digital Data Disappear, on Purpose
Ali, Saqib
-
2009/07/29
Re: XML signature HMAC truncation authentication bypass
Bill Stewart
-
2009/07/28
Re: XML signature HMAC truncation authentication bypass
Peter Gutmann
-
2009/07/28
Re: The latest Flash vulnerability and monoculture
dan
-
2009/07/28
Re: XML signature HMAC truncation authentication bypass
Jon Callas
-
2009/07/27
A Basic Rabin-Williams Digital Signature Specification
Thierry Moreau
-
2009/07/27
Re: The latest Flash vulnerability and monoculture
Perry E. Metzger
-
2009/07/27
Re: The latest Flash vulnerability and monoculture
John Gilmore
-
2009/07/27
Re: XML signature HMAC truncation authentication bypass
Peter Gutmann
-
2009/07/27
Re: The latest Flash vulnerability and monoculture
Peter Gutmann
-
2009/07/27
Re: The latest Flash vulnerability and monoculture
Peter Gutmann
-
2009/07/27
Re: The latest Flash vulnerability and monoculture
Jerry Leichter
-
2009/07/26
Re: The latest Flash vulnerability and monoculture
Perry E. Metzger
-
2009/07/26
Re: The latest Flash vulnerability and monoculture
Jerry Leichter
-
2009/07/26
Re: XML signature HMAC truncation authentication bypass
Jon Callas
-
2009/07/26
Re: Fast MAC algorithms?
james hughes
-
2009/07/26
ADMIN: slight list hiccup today
Perry E. Metzger
-
2009/07/26
Re: Fast MAC algorithms?
James A. Donald
-
2009/07/26
The latest Flash vulnerability and monoculture
Perry E. Metzger
-
2009/07/26
Re: XML signature HMAC truncation authentication bypass
Peter Gutmann
-
2009/07/26
Re: cleversafe says: 3 Reasons Why Encryption is Overrated
Jerry Leichter
-
2009/07/26
Re: cleversafe says: 3 Reasons Why Encryption is Overrated
james hughes
-
2009/07/25
NIST announces SHA-3 round 2 candidates
Jack Lloyd
-
2009/07/24
cleversafe says: 3 Reasons Why Encryption is Overrated
Zooko Wilcox-O'Hearn
-
2009/07/24
Hacker Says iPhone 3GS Encryption Is ‘Useless’ f or Businesses
mhey...@gmail.com
-
2009/07/24
Re: Fast MAC algorithms?
Darren J Moffat
-
2009/07/24
Re: Fast MAC algorithms?
james hughes
-
2009/07/24
Re: Fast MAC algorithms?
Peter Gutmann
-
2009/07/24
Re: Fast MAC algorithms?
John Gilmore
-
2009/07/23
Re: Fast MAC algorithms?
james hughes
-
2009/07/23
Re: Fast MAC algorithms?
Nicolas Williams
-
2009/07/23
Re: Fast MAC algorithms?
mhey...@gmail.com
-
2009/07/23
Re: Fast MAC algorithms?
Peter Gutmann
-
2009/07/23
Re: New Technology to Make Digital Data Disappear, on Purpose
Jerry Leichter
-
2009/07/23
Re: Fast MAC algorithms?
Joseph Ashwood
-
2009/07/22
Re: Fast MAC algorithms?
mhey...@gmail.com
-
2009/07/22
Re: Zooko's semi-private keys
Jerry Leichter
-
2009/07/22
Re: Fast MAC algorithms?
Nicolas Williams
-
2009/07/22
Re: Fast MAC algorithms?
Jack Lloyd
-
2009/07/22
Re: Fast MAC algorithms?
Joseph Ashwood
-
2009/07/22
Re: New Technology to Make Digital Data Disappear, on Purpose
Perry E. Metzger
-
2009/07/21
Fast MAC algorithms?
Nicolas Williams
-
2009/07/21
Re: New Technology to Make Digital Data Disappear, on Purpose
dan
-
2009/07/21
Zooko's semi-private keys
"Hal Finney"
-
2009/07/21
Re: spyware on Blackberries
Perry E. Metzger
-
2009/07/21
New Technology to Make Digital Data Disappear, on Purpose
Ali, Saqib
-
2009/07/20
Re: XML signature HMAC truncation authentication bypass
Jon Callas
-
2009/07/20
Re: 112-bit prime ECDLP solved
Zooko Wilcox-O'Hearn
-
2009/07/20
Re: 112-bit prime ECDLP solved
Paul Hoffman
-
2009/07/19
Re: work factor calculation for brute-forcing crypto
David Malone
-
2009/07/19
why hyperelliptic curves?
Zooko Wilcox-O'Hearn
-
2009/07/19
Re: 112-bit prime ECDLP solved
Zooko Wilcox-O'Hearn
-
2009/07/19
Re: work factor calculation for brute-forcing crypto
David Wagner
-
2009/07/19
Re: XML signature HMAC truncation authentication bypass
Peter Gutmann
-
2009/07/17
Re: 112-bit prime ECDLP solved
Tanja Lange
-
2009/07/17
work factor calculation for brute-forcing crypto
travis+ml-cryptography
-
2009/07/17
XML signature HMAC truncation authentication bypass
Leandro Meiners
-
2009/07/17
Re: Intercepting Microsoft wireless keyboard communications
travis+ml-cryptography
-
2009/07/17
Re: 112-bit prime ECDLP solved
james hughes
-
2009/07/17
Re: Physical security rather than crypto---but perhaps of interest
Ali, Saqib
-
2009/07/16
Re: Physical security rather than crypto---but perhaps of interest
Darren J Moffat
-
2009/07/16
Re: 112-bit prime ECDLP solved
James A. Donald
-
2009/07/16
spyware on Blackberries
Steven M. Bellovin
-
2009/07/15
RE: HSM outage causes root CA key loss
Weger, B.M.M. de
-
2009/07/15
Re: HSM outage causes root CA key loss
Peter Gutmann
-
2009/07/15
Re: HSM outage causes root CA key loss
Peter Gutmann
-
2009/07/15
Re: HSM outage causes root CA key loss
Peter Gutmann
-
2009/07/14
Re: 112-bit prime ECDLP solved
Tanja Lange
-
2009/07/14
Re: HSM outage causes root CA key loss
Dirk-Willem van Gulik
-
2009/07/14
Re: HSM outage causes root CA key loss
Nicolas Williams
-
2009/07/14
RE: HSM outage causes root CA key loss
Paul Hoffman
-
2009/07/14
RE: HSM outage causes root CA key loss
Weger, B.M.M. de
-
2009/07/14
Re: HSM outage causes root CA key loss
Charles McElwain
-
2009/07/14
Re: HSM outage causes root CA key loss
Jeffrey I. Schiller
-
2009/07/14
Re: HSM outage causes root CA key loss
Stefan Kelm
-
2009/07/14
Re: 112-bit prime ECDLP solved
James A. Donald
-
2009/07/14
Physical security rather than crypto---but perhaps of interest
Charles Jackson
-
2009/07/14
HSM outage causes root CA key loss
Peter Gutmann
-
2009/07/12
Re: Weakness in Social Security Numbers Is Found
Jerry Leichter
-
2009/07/12
112-bit prime ECDLP solved
Joppe Bos
-
2009/07/12
Re: Weakness in Social Security Numbers Is Found
Darren J Moffat
-
2009/07/09
Re: Weakness in Social Security Numbers Is Found
dan
-
2009/07/09
Very high rate true random number generation
Jerry Leichter
-
2009/07/08
Re: Weakness in Social Security Numbers Is Found
Bill Frantz
-
2009/07/08
Weakness in Social Security Numbers Is Found
Ali, Saqib
-
2009/07/07
Re: MD6 withdrawn from SHA-3 competition
Josh Rubin
-
2009/07/07
Re: MD6 withdrawn from SHA-3 competition
Chen Ke-Fei Lin
-
2009/07/06
Re: MD6 withdrawn from SHA-3 competition
Ray Dillinger
-
2009/07/06
Re: MD6 withdrawn from SHA-3 competition
Paul Hoffman
-
2009/07/05
Re: MD6 withdrawn from SHA-3 competition
"Hal Finney"
-
2009/07/05
Re: MD6 withdrawn from SHA-3 competition
Paul Hoffman
-
2009/07/04
Re: MD6 withdrawn from SHA-3 competition
Brandon Enright
-
2009/07/04
Re: What will happen to your crypto keys when you die?
silky
-
2009/07/04
Re: MD6 withdrawn from SHA-3 competition
Steven M. Bellovin
-
2009/07/03
Fluff Article from the WSJournal -- Deciphering a Message to Thomas Jefferson
James Vogel
-
2009/07/03
Re: MD6 withdrawn from SHA-3 competition
Joseph Ashwood
-
2009/07/03
Re: What will happen to your crypto keys when you die?
Jon Callas
-
2009/07/03
Re: What will happen to your crypto keys when you die?
Jack Lloyd
-
2009/07/02
Re: What will happen to your crypto keys when you die?
silky
-
2009/07/01
MD6 withdrawn from SHA-3 competition
Perry E. Metzger
-
2009/07/01
AES-256 attacked with time complexity 2^119
Perry E. Metzger
-
2009/07/01
Re: password safes for mac
Anne & Lynn Wheeler
-
2009/07/01
Re: password safes for mac
Adam Shostack
-
2009/07/01
Re: password safes for mac
Adam Shostack
-
2009/07/01
Re: password safes for mac
Nicolas Williams
-
2009/07/01
Re: password safes for mac
Nicolas Williams
-
2009/07/01
Re: password safes for mac
Victor Duchovni
-
2009/07/01
Re: password safes for mac
Perry E. Metzger
-
2009/07/01
Re: What will happen to your crypto keys when you die?
Udhay Shankar N
-
2009/07/01
Re: password safes for mac
Adam Shostack
-
2009/06/30
Re: password safes for mac
Nicolas Williams
-
2009/06/30
Re: password safes for mac
schism
-
2009/06/30
Re: password safes for mac
Jacob Appelbaum
-
2009/06/30
CSE growing so fast it needs new offices
Perry E. Metzger
-
2009/06/30
Re: password safes for mac
Jerry Leichter
-
2009/06/28
Re: password safes for mac
Adam Shostack
-
2009/06/28
NIST optimized AES hardware...
Perry E. Metzger
-
2009/06/28
Re: password safes for mac
schism
-
2009/06/28
Re: password safes for mac
Perry E. Metzger
-
2009/06/28
Re: password safes for mac
Bill Frantz
-
2009/06/28
Re: password safes for mac
Ivan Krstić
-
2009/06/28
Re: password safes for mac
Perry E. Metzger
-
2009/06/28
Re: password safes for mac
Jon Callas
-
2009/06/28
Re: password safes for mac
Perry E. Metzger
-
2009/06/28
Re: password safes for mac
Thorsten Holz
-
2009/06/28
Re: password safes for mac
Perry E. Metzger
-
2009/06/28
Re: password safes for mac
Bob Mahoney
-
2009/06/28
password safes for mac
Perry E. Metzger
-
2009/06/25
Re: [btns] IETF75
Eugen Leitl
-
2009/06/17
Re: Popular explanation of fully homomorphic encryption wanted
Jack Lloyd
-
2009/06/17
HashClash Released
I)ruid
-
2009/06/17
Transcripts of the NIST Sessions from the first SHA3 Candidate Conference
Ali, Saqib
-
2009/06/16
Re: Popular explanation of fully homomorphic encryption wanted
"Hal Finney"
-
2009/06/16
Re: SHA-1 in 2**52
"Hal Finney"
-
2009/06/16
Popular explanation of fully homomorphic encryption wanted
Udhay Shankar N
-
2009/06/14
SHA-1 in 2**52
I)ruid
-
2009/06/14
Re: padding attack vs. PKCS7
James Muir
-
2009/06/14
OT: Presentation on Effectively and Securely Using the Cloud Computing Paradigm
Ali, Saqib
-
2009/06/14
Re: Seagate announces hardware FDE for laptop and desktop machines
james hughes
-
2009/06/12
padding attack vs. PKCS7
travis+ml-cryptography
-
2009/06/12
Re: Seagate announces hardware FDE for laptop and desktop machines
travis+ml-cryptography
-
2009/06/07
Re: Factoring attack against RSA based on Pollard's Rho
Sandy Harris
-
2009/06/07
Re: Factoring attack against RSA based on Pollard's Rho
Victor Duchovni
-
2009/06/07
Re: Factoring attack against RSA based on Pollard's Rho
Victor Duchovni
-
2009/06/07
Re: Factoring attack against RSA based on Pollard's Rho
Ben Laurie
-
2009/06/07
Re: Factoring attack against RSA based on Pollard's Rho
Victor Duchovni
-
2009/06/07
Re: Factoring attack against RSA based on Pollard's Rho
Paul Hoffman
-
2009/06/06
Factoring attack against RSA based on Pollard's Rho
Greg Perry
-
2009/06/05
xkcd has cracked the Voynich manuscript
Harald Hanche-Olsen
-
2009/06/05
Tellitec Tellinet Sat Spy manual leaked
Eugen Leitl
-
2009/06/03
How to wiretap or identify a GSM phone - and enable the masses
John Gilmore
-
2009/06/01
Mifare Plus deployed in LA
Perry E. Metzger
-
2009/06/01
Banks phishes its own customers
Peter Gutmann
-
2009/05/30
Re: consulting question.... (DRM)
John Ioannidis
-
2009/05/30
Re: white-box crypto Was: consulting question....
Brecht Wyseur
-
2009/05/30
Re: consulting question.... (DRM)
Jerry Leichter
-
2009/05/29
Re: consulting question.... (DRM)
Peter Gutmann
-
2009/05/29
NYT: "Pentagon Plans New Arm to Wage Wars in Cyberspace"
Perry E. Metzger
-
2009/05/29
Re: End-of-chapter questions for "Practical Cryptography"?
Your Monkey Overlord
-
2009/05/29
What will happen to your crypto keys when you die?
Udhay Shankar N
-
2009/05/29
white-box crypto Was: consulting question....
Brecht Wyseur
-
2009/05/29
Neat idea
Jerry Leichter
-
2009/05/29
Re: white-box crypto Was: consulting question....
James Muir
-
2009/05/29
Re: consulting question.... (DRM)
John Gilmore
-
2009/05/27
Re: consulting question....
Ray Dillinger
-
2009/05/27
Re: consulting question.... (DRM)
Bill Squier
-
2009/05/27
Re: consulting question....
Roland Dowdeswell
-
2009/05/27
Re: consulting question.... (DRM)
Nathan Loofbourrow
-
2009/05/27
Re: consulting question.... (DRM)
Jerry Leichter
-
2009/05/27
white-box crypto Was: consulting question....
Alexander Klimov
-
2009/05/27
Re: consulting question....
Marcus Brinkmann
-
2009/05/27
Re: consulting question.... (DRM)
Darren J Moffat
-
2009/05/27
Re: consulting question.... (DRM)
Ray Dillinger
-
2009/05/27
Re: consulting question....
John Ioannidis
-
2009/05/27
Re: consulting question....
James Muir
-
2009/05/26
Re: consulting question.... (DRM)
John Gilmore
-
2009/05/26
consulting question....
Ray Dillinger
-
2009/05/24
Re: Warning! New cryptographic modes!
Alexander Klimov
-
2009/05/22
Re: Warning! New cryptographic modes!
Zooko Wilcox-O'Hearn
-
2009/05/22
Re: End-of-chapter questions for "Practical Cryptography"?
Jonathan Katz
-
2009/05/22
Distinguisher and Related-Key Attack on the Full AES-256
Jack Lloyd
-
2009/05/22
Re: End-of-chapter questions for "Practical Cryptography"?
Perry E. Metzger
-
2009/05/22
security fail (from failblog)
mhey...@gmail.com
-
2009/05/22
End-of-chapter questions for "Practical Cryptography"?
Paul Hoffman
-
2009/05/22
Re: Warning! New cryptographic modes!
james hughes
-
2009/05/21
[fc-announce] CF Workshop Proposals for FC10. Deadline: June 15, 2009
R.A. Hettinga
-
2009/05/21
visualizing modes of operation
Steven M. Bellovin
-
2009/05/21
Re: Warning! New cryptographic modes!
Jon Callas
-
2009/05/21
Re: Warning! New cryptographic modes!
Jerry Leichter
-
2009/05/21
A Service to Prove You are Really You
Ali, Saqib
-
2009/05/21
Re: Significance of Schnorr's "Factoring Integers in Polynomial Time"?
Markus Rückert
-
2009/05/21
Re: Solving password problems one at a time, Re: The password-reset paradox
Anne & Lynn Wheeler
-
2009/05/21
Re: Warning! New cryptographic modes!
silky
-
2009/05/21
Re: Warning! New cryptographic modes!
Darren J Moffat
-
2009/05/21
Re: Warning! New cryptographic modes!
James A. Donald
-
2009/05/21
Re: Warning! New cryptographic modes!
Matt Ball
-
2009/05/21
Fwd: cryptohippie: the electronic police state ranking 2008
R.A. Hettinga
-
2009/05/21
Re: Warning! New cryptographic modes!
silky
-
2009/05/21
Re: Warning! New cryptographic modes!
Jerry Leichter
-
2009/05/21
Re: Warning! New cryptographic modes!
silky