cryptography
Thread
Date
Find
[
Earlier messages
]
[
Later messages
]
Messages by Thread
Re: IP: Smart Cards with Chips encouraged
Steven M. Bellovin
key revokation ain't
Julian Assange
Ecash without a mint
Anonymous
Re: Ecash without a mint
Adam Back
Re: Ecash without a mint
Wei Dai
Re: Ecash without a mint
bram
Re: Ecash without a mint
David Jablon
Re: Ecash without a mint
Wei Dai
Re: Ecash without a mint
Anonymous
Re: Ecash without a mint
Wei Dai
Re: Ecash without a mint
Robert Hettinga
Re: Ecash without a mint
Anonymous
ECC '99 third announcement
M Taylor
RSA Security, Inc.
Vin McLellan
Re: RSA Security, Inc.
Ben Laurie
ADMIN: mysterious bounces
Perry E. Metzger
No liberalization for source code, API's
Greg Broiles
RE: No liberalization for source code, API's
Trei, Peter
Re: No liberalization for source code, API's
Dan Geer
Re: No liberalization for source code, API's
John Gilmore
Re: No liberalization for source code, API's
Ernest Hua
RSA
staym
RSA
(Mr) Lyn R. Kennedy
Diffie Hellman
Simon Mark Aronson
White House Report: Preserving America's Privacy in the NextCentury
Robert Hettinga
Re: White House Report: Preserving America's Privacy in the Next Century
P.J. Ponder
secure access products for NT?
Perry E. Metzger
ACP Applauds Modernization of Encryption Policy
Robert Hettinga
Constitution Week announced along with crypto re-controls.
Anonymous
Formal Security Evaluation Survey/History
Rick Smith
Why did White House change its mind on crypto?
Declan McCullagh
Re: Why did White House change its mind on crypto?
Ben Laurie
Re: Why did White House change its mind on crypto?
Russell Nelson
Re: Why did White House change its mind on crypto?
Greg Broiles
Re: Why did White House change its mind on crypto?
Martin Minow
Re: Why did White House change its mind on crypto?
Arnold Reinhold
Re: Why did White House change its mind on crypto?
Adam Shostack
Re: Why did White House change its mind on crypto?
staym
Re: Why did White House change its mind on crypto?
P.J. Ponder
RE: Why did White House change its mind on crypto?
Lucky Green
Re: Why did White House change its mind on crypto?
Matt Blaze
I'm not sure we have the obvious problem here.
Russell Nelson
Re: Why did White House change its mind on crypto?
staym
Re: Why did White House change its mind on crypto?
Marc Horowitz
Re: Why did White House change its mind on crypto?
bram
Re: Why did White House change its mind on crypto?
Marc Horowitz
Re: Why did White House change its mind on crypto?
Howie Goodell
new export restrictions and free software
Nelson Minar
Re: Why did White House change its mind on crypto?
Jeffrey Altman
Re: Why did White House change its mind on crypto?
Peter D. Junger
Re: Why did White House change its mind on crypto?
Steven M. Bellovin
Re: Why did White House change its mind on crypto?
Bill Stewart
Re: Why did White House change its mind on crypto?
Steven M. Bellovin
Re: Why did White House change its mind on crypto?
Steven M. Bellovin
Re: US encryption announcement: Business as usual
Bill Stewart
Re: US encryption announcement: Business as usual
Greg Broiles
Re: more re Encryption Technology Limits Eased
Steven M. Bellovin
Re: more re Encryption Technology Limits Eased
Sandy Harris
Re: more re Encryption Technology Limits Eased
Robert Hettinga
Re: more re Encryption Technology Limits Eased
Declan McCullagh
RE: more re Encryption Technology Limits Eased
Rodger, William
RE: more re Encryption Technology Limits Eased
Antonomasia
RE: more re Encryption Technology Limits Eased
Jay Holovacs
Re: more re Encryption Technology Limits Eased
William Allen Simpson
Re: having source code for your CPU chip -- NOT
John Gilmore
Re: having source code for your CPU chip -- NOT
Arnold Reinhold
Re: having source code for your CPU chip -- NOT
Bill Frantz
Re: having source code for your CPU chip -- NOT
Martin Minow
Re: having source code for your CPU chip -- NOT
Bill Frantz
RE: more re Encryption Technology Limits Eased
Antonomasia
Re: more re Encryption Technology Limits Eased
Charlie_Kaufman
RE: more re Encryption Technology Limits Eased
Trei, Peter
Re: Intel RNG
Anonymous
Re: Intel RNG
Arnold Reinhold
Re: Intel RNG
Eugene Leitl
Re: BOUNCE dcsb@ai.mit.edu: Non-member submission from [JohnGilmore <gnu@toad.com>]
Robert Hettinga
Ah. That's more like it...
Robert Hettinga
Re: Ah. That's more like it...
Robert Hettinga
IP: Statement By The Press Secretary: Administration AnnouncesNew Approach to Encryption
Robert Hettinga
Administration Updates Encryption Policy
Robert Hettinga
Re: Administration Updates Encryption Policy
John Gilmore
U.S. to loosen crypto rules
Steven M. Bellovin
Anyone looked at robustness of www.javacrypt.com ?
Caspar Bowden
[David Farber <farber@cis.upenn.edu>] more re Encryption Technology Limits Eased
Perry E. Metzger
Re: more re Encryption Technology Limits Eased
John Gilmore
Re: more re Encryption Technology Limits Eased
Tom Weinstein
Re: more re Encryption Technology Limits Eased
Steve Cook
Re: more re Encryption Technology Limits Eased
Declan McCullagh
RE: more re Encryption Technology Limits Eased
Lucky Green
RE: more re Encryption Technology Limits Eased
Declan McCullagh
Re: more re Encryption Technology Limits Eased
William Allen Simpson
DCSB: Gerald Gold; Internet Content -- Stories from the Front
Robert Hettinga
Re: linux-ipsec: Intel IPSEC accelerator gives 3DES protected 100Mbit Ethernet
William H. Geiger III
Re: linux-ipsec: Intel IPSEC accelerator gives 3DES protected 100Mbit Ethernet
Paul Crowley
Intel RNG
bram
Re: linux-ipsec: Intel IPSEC accelerator gives 3DES protected 100Mbit Ethernet
William H. Geiger III
Re: linux-ipsec: Intel IPSEC accelerator gives 3DES protected 100Mbit Ethernet
Greg Broiles
Re: linux-ipsec: Intel IPSEC accelerator gives 3DES protected 100Mbit Ethernet
Scott G. Kelly
Intel's new encryption chipset
Udhay Shankar N
Intel IPSEC accelerator gives 3DES protected 100Mbit Ethernet
John Gilmore
Re: Intel IPSEC accelerator gives 3DES protected 100Mbit Ethernet
Eric Young
RSA security advert
Russell Nelson
IP: Admin Plans to Loosen Encryption Restrictions
Robert Hettinga
Re: IP: Admin Plans to Loosen Encryption Restrictions
Bill Frantz
Re: IP: Admin Plans to Loosen Encryption Restrictions
Ben Laurie
ANNOUNCE: Scrambling for Safety 3.5 (UK), 23/9/99
Caspar Bowden
How many ways can one form an abelian group with N symbols?
staym
MSFT's NSA key as key escrow solution
Adam Back
Microsoft passport
Justin F Chapweske
Re: Microsoft passport
Chris Monroe
Apis32 and how to edit advapi32.dll
Niels Stenhøj
FreeS/WAN goes to the bank...
Robert Hettinga
[SF-BAY-CYPHERPUNKS] 11 Sept: "A5/2 and Other RecentunDevelopments"
Dave Del Torto
plausible CAPI recovery designs (Re: FW: Cryptonym...)
Adam Back
Re: plausible CAPI recovery designs (Re: FW: Cryptonym...)
P.J. Ponder
Re: plausible CAPI recovery designs (Re: FW: Cryptonym...)
Martin Minow
Fwd: (event) MIT Security Studies Program Seminar Series Fall '99 (Wed. 12-1:30)
Robert Hettinga
ANNOUNCE - SF Bay Area Cypherpunks Saturday 11 September 1999 Physical Meeting
Bill Stewart
Ellsmore Paper
Streetman, K. D. (KDS)
Re: Ellsmore Paper
Rahul Mehta
Fwd: munitions.
Udhay Shankar N
Windows and FIPS 140-1
David Kennedy CISSP
RE: Windows and FIPS 140-1
Donahue, Edward
Sue MSNSA for Key?
John Young
Re: Sue MSNSA for Key?
Markus Kuhn
Encrypto Mailing List
Robert Hettinga
MSNSA Key Not News
John Young
Echelon in the news
Steven M. Bellovin
NSA & MSFT CAPI keys as PGP keys
Adam Back
Re: 'Spy cameras may have been installed in photocopiers all over theworld'
Ross Anderson
Re: 'Spy cameras may have been installed in photocopiers all over theworld'
Matt Blaze
NSA aka 'Big Brother' in Lotus Notes
Adam Back
ADMIN: enough _NSAKEY for now
Perry E. Metzger
[PGP]: Bruce Schneier weighs in
Robert Hettinga
Re: Microsoft Windows has NSA Crypto Backdoor
T Bruce Tober
IP: Microsoft Letting Government Snoop
Robert Hettinga
Paul Brown on Solitiare randomness flaw?
Dave Del Torto
Re: Paul Brown on Solitiare randomness flaw?
William H. Geiger III
Re: Paul Brown on Solitiare randomness flaw?
Arnold Reinhold
Re: Paul Brown on Solitiare randomness flaw?
mgraffam
Re: Paul Brown on Solitiare randomness flaw?
Arnold Reinhold
Re: Paul Brown on Solitiare randomness flaw?
Paul Crowley
Re: Paul Brown on Solitiare randomness flaw?
Bill Stewart
Re: Paul Brown on Solitiare randomness flaw?
Arnold Reinhold
crypto on calculators
mgraffam
Re: crypto on calculators
Matt Crawford
Re: crypto on calculators
Bill Stewart
Re: crypto on calculators
Bill Frantz
Re: crypto on calculators
Alan Olsen
Re: Paul Brown on Solitiare randomness flaw?
Thomas W. Kellar
Re: Paul Brown on Solitiare randomness flaw?
Arnold Reinhold
Re: Paul Brown on Solitiare randomness flaw?
Anonymous
Re: Paul Brown on Solitiare randomness flaw?
Anonymous
Re: Paul Brown on Solitiare randomness flaw?
amanda
RE: Paul Brown on Solitiare randomness flaw?
Kuehn, Ulrich
RE: Paul Brown on Solitiare randomness flaw?
Arnold Reinhold
Policy page redux?
Robert Hettinga
Re: [dc-sage] Microsoft, the NSA, and you... (fwd)
Robert Hettinga
More details on "Operation Broken Glass"
Robert Hettinga
NSA key in MSFT Crypto API
Lucky Green
Re: NSA key in MSFT Crypto API
David U.
Re: NSA key in MSFT Crypto API
Matt Blaze
RE: NSA key in MSFT Crypto API
Tim Dierks
RE: NSA key in MSFT Crypto API
Lucky Green
Re: NSA key in MSFT Crypto API
Eric Murray
Re: NSA key in MSFT Crypto API
Robert Hettinga
RE: NSA key in MSFT Crypto API
Lucky Green
RE: NSA key in MSFT Crypto API
Salz, Rich
Re: NSA key in MSFT Crypto API
John Gilmore
RE: NSA key in MSFT Crypto API
Trei, Peter
RE: NSA key in MSFT Crypto API
William H. Geiger III
Re: NSA key in MSFT Crypto API
Markus Kuhn
Re: NSA key in MSFT Crypto API
Jay Holovacs
Re: NSA key in MSFT Crypto API
William H. Geiger III
Re: NSA key in MSFT Crypto API
Anonymous
Re: NSA key in MSFT Crypto API
Rich Salz
RE: NSA key in MSFT Crypto API
Phill Hallam-Baker
RE: NSA key in MSFT Crypto API
William H. Geiger III
RE: NSA key in MSFT Crypto API
Peter Gutmann
Re: NSA key in MSFT Crypto API
Steven M. Bellovin
RE: NSA key in MSFT Crypto API
Peter Gutmann
Re: Project: Hardening Crypto Against Big Brother's "BlackBag"Intrusions
Robert Hettinga
FC: Progressive Policy Institute forum in DC on September 13
Robert Hettinga
RE: 3DEs export?
Elyn Wollensky
Kennedy School Seminar: "Slipping Through the Net - CriminalOpportunities on the Information Highways"
Robert Hettinga
Verification of peer certificates in PerlSSL
Enzo Michelangeli
3DEs export?
Michael Froomkin - U.Miami School of Law
Re: 3DEs export?
Phil Karn
Re: 3DEs export?
John Gilmore
Re: 3DEs export?
Pat Farrell
(resend) Re: Summary re: /dev/random
Don Davis
RE: linux-ipsec: US Justice Dept punting DES in favor of 3DES VPN
Chuck Bushong
Micro Payments BOF in the next IETF (Nov 99, Wash DC)
Robert Hettinga
Re: Micro Payments BOF in the next IETF (Nov 99, Wash DC)
Robert Hettinga
Re: Micro Payments BOF in the next IETF (Nov 99, Wash DC)
Robert Hettinga
FCC issues CALEA orders
Ross Harvey
Re: FCC issues CALEA orders
James Glave
Re: FCC issues CALEA orders
Richard D. Murad
Re: FCC issues CALEA orders
Marc Horowitz
CALEA rules approved by the FCC
Steven M. Bellovin
[
Earlier messages
]
[
Later messages
]