Cryptography-Digest Digest #289, Volume #12 Wed, 26 Jul 00 06:13:01 EDT
Contents:
Re: TheArgon Site (James Pate Williams, Jr.)
Re: Playing with an 8 bit cipher. (Mack)
Re: How is the security of Outlook Express encryption ? (Greg)
Re: Proposal of some processor instructions for
Cryptography-Digest Digest #290, Volume #12 Wed, 26 Jul 00 12:13:01 EDT
Contents:
Re: Playing with an 8 bit cipher. (Runu Knips)
Re: Proving continued possession of a file ("Rick Heylen")
Re: Rabin's information dispersal algorithm (Wei Dai)
Re: TheArgon Site (John Savard)
Re:
Cryptography-Digest Digest #291, Volume #12 Wed, 26 Jul 00 15:13:01 EDT
Contents:
Re: Get Free Software (Mark Wooding)
Re: Playing with an 8 bit cipher. (Mack)
Re: 8 bit block ciphers (Mack)
Re: Proving continued possession of a file (Andru Luvisi)
Re: Question.How to avoid weak
Cryptography-Digest Digest #293, Volume #12 Wed, 26 Jul 00 20:13:01 EDT
Contents:
Re: purpose of final swap in Twofish? (Eric Smith)
Re: MD5 algorithm questions (Bill Unruh)
Skipjack (David A. Wagner)
Re: purpose of final swap in Twofish? (David A. Wagner)
how to cirucmvent the
Cryptography-Digest Digest #292, Volume #12 Wed, 26 Jul 00 18:13:01 EDT
Contents:
Re: Random Appearance (Future Beacon)
Re: purpose of final swap in Twofish? (Eric Smith)
"Symmetric" RSA encryption (John Myre)
Re: Database encryption (Mok-Kong Shen)
Re: Random Appearance (Mok-Kong