cryptography
Thread
Date
Earlier messages
Later messages
Messages by Thread
Re: SHA-1 and Git (was Re: [tahoe-dev] Tahoe-LAFS key management, part 2: Tahoe-LAFS is like encrypted git)
Peter Gutmann
Re: SHA-1 and Git (was Re: [tahoe-dev] Tahoe-LAFS key management, part 2: Tahoe-LAFS is like encrypted git)
James A. Donald
Re: SHA-1 and Git (was Re: [tahoe-dev] Tahoe-LAFS key management, part 2: Tahoe-LAFS is like encrypted git)
Thor Lancelot Simon
Re: SHA-1 and Git (was Re: [tahoe-dev] Tahoe-LAFS key management, part 2: Tahoe-LAFS is like encrypted git)
Peter Gutmann
Re: SHA-1 and Git (was Re: [tahoe-dev] Tahoe-LAFS key management, part 2: Tahoe-LAFS is like encrypted git)
Fuzzy Hoodie-Monster
Re: SHA-1 and Git (was Re: [tahoe-dev] Tahoe-LAFS key management, part 2: Tahoe-LAFS is like encrypted git)
Nicolas Williams
FW: cleversafe says: 3 Reasons Why Encryption is Overrated
Jason Resch
Hacker Says iPhone 3GS Encryption Is ‘Useless’ f or Businesses
mhey...@gmail.com
Fast MAC algorithms?
Nicolas Williams
Re: Fast MAC algorithms?
Joseph Ashwood
Re: Fast MAC algorithms?
Jack Lloyd
Re: Fast MAC algorithms?
Nicolas Williams
Re: Fast MAC algorithms?
mhey...@gmail.com
Re: Fast MAC algorithms?
Peter Gutmann
Re: Fast MAC algorithms?
mhey...@gmail.com
Re: Fast MAC algorithms?
Nicolas Williams
Re: Fast MAC algorithms?
james hughes
Re: Fast MAC algorithms?
Peter Gutmann
Re: Fast MAC algorithms?
james hughes
Re: Fast MAC algorithms?
Darren J Moffat
Re: Fast MAC algorithms?
John Gilmore
Re: Fast MAC algorithms?
Joseph Ashwood
Re: Fast MAC algorithms?
James A. Donald
Re: Fast MAC algorithms?
james hughes
Re: Fast MAC algorithms?
Joseph Ashwood
Re: Fast MAC algorithms?
James A. Donald
Re: Fast MAC algorithms?
Joseph Ashwood
Protocol Construction WAS Re: Fast MAC algorithms?
Joseph Ashwood
Attacks against GOST? Was: Protocol Construction
Alexander Klimov
Re: Attacks against GOST? Was: Protocol Construction
Joseph Ashwood
Re: Fast MAC algorithms?
Zooko Wilcox-O'Hearn
Zooko's semi-private keys
"Hal Finney"
Re: Zooko's semi-private keys
Jerry Leichter
New Technology to Make Digital Data Disappear, on Purpose
Ali, Saqib
Re: New Technology to Make Digital Data Disappear, on Purpose
dan
Re: New Technology to Make Digital Data Disappear, on Purpose
Perry E. Metzger
Re: New Technology to Make Digital Data Disappear, on Purpose
Jerry Leichter
Re: New Technology to Make Digital Data Disappear, on Purpose
Ali, Saqib
Re: New Technology to Make Digital Data Disappear, on Purpose
Ali, Saqib
work factor calculation for brute-forcing crypto
travis+ml-cryptography
Re: work factor calculation for brute-forcing crypto
David Malone
Re: work factor calculation for brute-forcing crypto
David Wagner
XML signature HMAC truncation authentication bypass
Leandro Meiners
Re: XML signature HMAC truncation authentication bypass
Peter Gutmann
Re: XML signature HMAC truncation authentication bypass
Jon Callas
Re: XML signature HMAC truncation authentication bypass
Peter Gutmann
Re: XML signature HMAC truncation authentication bypass
Jon Callas
Re: XML signature HMAC truncation authentication bypass
Peter Gutmann
Re: XML signature HMAC truncation authentication bypass
Jon Callas
Re: XML signature HMAC truncation authentication bypass
Peter Gutmann
Re: XML signature HMAC truncation authentication bypass
Bill Stewart
Re: Intercepting Microsoft wireless keyboard communications
travis+ml-cryptography
spyware on Blackberries
Steven M. Bellovin
Re: spyware on Blackberries
Perry E. Metzger
HSM outage causes root CA key loss
Peter Gutmann
Re: HSM outage causes root CA key loss
Stefan Kelm
Re: HSM outage causes root CA key loss
Jeffrey I. Schiller
Re: HSM outage causes root CA key loss
Peter Gutmann
Re: HSM outage causes root CA key loss
Charles McElwain
RE: HSM outage causes root CA key loss
Weger, B.M.M. de
RE: HSM outage causes root CA key loss
Paul Hoffman
Re: HSM outage causes root CA key loss
Nicolas Williams
Re: HSM outage causes root CA key loss
Peter Gutmann
Re: HSM outage causes root CA key loss
Dirk-Willem van Gulik
Re: HSM outage causes root CA key loss
Peter Gutmann
RE: HSM outage causes root CA key loss
Weger, B.M.M. de
112-bit prime ECDLP solved
Joppe Bos
Re: 112-bit prime ECDLP solved
James A. Donald
Re: 112-bit prime ECDLP solved
Tanja Lange
Re: 112-bit prime ECDLP solved
James A. Donald
Re: 112-bit prime ECDLP solved
Tanja Lange
Re: 112-bit prime ECDLP solved
Zooko Wilcox-O'Hearn
why hyperelliptic curves?
Zooko Wilcox-O'Hearn
Re: 112-bit prime ECDLP solved
Paul Hoffman
Re: 112-bit prime ECDLP solved
Zooko Wilcox-O'Hearn
Re: 112-bit prime ECDLP solved
james hughes
Very high rate true random number generation
Jerry Leichter
Weakness in Social Security Numbers Is Found
Ali, Saqib
Re: Weakness in Social Security Numbers Is Found
Bill Frantz
Re: Weakness in Social Security Numbers Is Found
dan
Re: Weakness in Social Security Numbers Is Found
Darren J Moffat
Re: Weakness in Social Security Numbers Is Found
Jerry Leichter
Physical security rather than crypto---but perhaps of interest
Charles Jackson
Re: Physical security rather than crypto---but perhaps of interest
Darren J Moffat
Re: Physical security rather than crypto---but perhaps of interest
Ali, Saqib
Fluff Article from the WSJournal -- Deciphering a Message to Thomas Jefferson
James Vogel
MD6 withdrawn from SHA-3 competition
Perry E. Metzger
Re: MD6 withdrawn from SHA-3 competition
Joseph Ashwood
Re: MD6 withdrawn from SHA-3 competition
Steven M. Bellovin
Re: MD6 withdrawn from SHA-3 competition
Brandon Enright
Re: MD6 withdrawn from SHA-3 competition
Paul Hoffman
Re: MD6 withdrawn from SHA-3 competition
"Hal Finney"
Re: MD6 withdrawn from SHA-3 competition
Paul Hoffman
Re: MD6 withdrawn from SHA-3 competition
Josh Rubin
Re: MD6 withdrawn from SHA-3 competition
Ray Dillinger
Re: MD6 withdrawn from SHA-3 competition
Chen Ke-Fei Lin
AES-256 attacked with time complexity 2^119
Perry E. Metzger
CSE growing so fast it needs new offices
Perry E. Metzger
NIST optimized AES hardware...
Perry E. Metzger
password safes for mac
Perry E. Metzger
Re: password safes for mac
Bob Mahoney
Re: password safes for mac
Perry E. Metzger
Re: password safes for mac
Thorsten Holz
Re: password safes for mac
Perry E. Metzger
Re: password safes for mac
Bill Frantz
Re: password safes for mac
Perry E. Metzger
Re: password safes for mac
Jon Callas
Re: password safes for mac
Perry E. Metzger
Re: password safes for mac
Ivan Krstić
Re: password safes for mac
Jerry Leichter
Re: password safes for mac
Jacob Appelbaum
Re: password safes for mac
schism
Re: password safes for mac
Nicolas Williams
Re: password safes for mac
Adam Shostack
Re: password safes for mac
Perry E. Metzger
Re: password safes for mac
Nicolas Williams
Re: password safes for mac
Nicolas Williams
Re: password safes for mac
Anne & Lynn Wheeler
Re: password safes for mac
Adam Shostack
Re: password safes for mac
Adam Shostack
Re: password safes for mac
Victor Duchovni
Re: password safes for mac
schism
Re: password safes for mac
Adam Shostack
Re: [btns] IETF75
Eugen Leitl
HashClash Released
I)ruid
Transcripts of the NIST Sessions from the first SHA3 Candidate Conference
Ali, Saqib
Popular explanation of fully homomorphic encryption wanted
Udhay Shankar N
Re: Popular explanation of fully homomorphic encryption wanted
"Hal Finney"
Re: Popular explanation of fully homomorphic encryption wanted
Jack Lloyd
SHA-1 in 2**52
I)ruid
Re: SHA-1 in 2**52
"Hal Finney"
OT: Presentation on Effectively and Securely Using the Cloud Computing Paradigm
Ali, Saqib
padding attack vs. PKCS7
travis+ml-cryptography
Re: padding attack vs. PKCS7
James Muir
Re: Seagate announces hardware FDE for laptop and desktop machines
travis+ml-cryptography
Re: Seagate announces hardware FDE for laptop and desktop machines
james hughes
Factoring attack against RSA based on Pollard's Rho
Greg Perry
Re: Factoring attack against RSA based on Pollard's Rho
Paul Hoffman
Re: Factoring attack against RSA based on Pollard's Rho
Ben Laurie
Re: Factoring attack against RSA based on Pollard's Rho
Victor Duchovni
Re: Factoring attack against RSA based on Pollard's Rho
Victor Duchovni
Re: Factoring attack against RSA based on Pollard's Rho
Victor Duchovni
Re: Factoring attack against RSA based on Pollard's Rho
Sandy Harris
xkcd has cracked the Voynich manuscript
Harald Hanche-Olsen
Tellitec Tellinet Sat Spy manual leaked
Eugen Leitl
How to wiretap or identify a GSM phone - and enable the masses
John Gilmore
Mifare Plus deployed in LA
Perry E. Metzger
Banks phishes its own customers
Peter Gutmann
NYT: "Pentagon Plans New Arm to Wage Wars in Cyberspace"
Perry E. Metzger
What will happen to your crypto keys when you die?
Udhay Shankar N
Re: What will happen to your crypto keys when you die?
Udhay Shankar N
Re: What will happen to your crypto keys when you die?
silky
Re: What will happen to your crypto keys when you die?
Jack Lloyd
Re: What will happen to your crypto keys when you die?
silky
Re: What will happen to your crypto keys when you die?
Jon Callas
white-box crypto Was: consulting question....
Brecht Wyseur
Neat idea
Jerry Leichter
consulting question....
Ray Dillinger
Re: consulting question.... (DRM)
John Gilmore
Re: consulting question.... (DRM)
Ray Dillinger
Re: consulting question.... (DRM)
Jerry Leichter
Re: consulting question.... (DRM)
Peter Gutmann
Re: consulting question.... (DRM)
Jerry Leichter
Re: consulting question.... (DRM)
Bill Squier
Re: consulting question.... (DRM)
John Gilmore
Re: consulting question.... (DRM)
John Ioannidis
Re: consulting question.... (DRM)
Darren J Moffat
Re: consulting question.... (DRM)
Nathan Loofbourrow
Re: consulting question....
James Muir
white-box crypto Was: consulting question....
Alexander Klimov
Re: white-box crypto Was: consulting question....
James Muir
Re: white-box crypto Was: consulting question....
Brecht Wyseur
Re: consulting question....
John Ioannidis
Re: consulting question....
Marcus Brinkmann
Re: consulting question....
Roland Dowdeswell
Re: consulting question....
Ray Dillinger
Distinguisher and Related-Key Attack on the Full AES-256
Jack Lloyd
security fail (from failblog)
mhey...@gmail.com
End-of-chapter questions for "Practical Cryptography"?
Paul Hoffman
Re: End-of-chapter questions for "Practical Cryptography"?
Perry E. Metzger
Re: End-of-chapter questions for "Practical Cryptography"?
Jonathan Katz
Re: End-of-chapter questions for "Practical Cryptography"?
Your Monkey Overlord
[fc-announce] CF Workshop Proposals for FC10. Deadline: June 15, 2009
R.A. Hettinga
visualizing modes of operation
Steven M. Bellovin
A Service to Prove You are Really You
Ali, Saqib
Fwd: cryptohippie: the electronic police state ranking 2008
R.A. Hettinga
What happened to X9.59?
Peter Gutmann
Re: What happened to X9.59?
Anne & Lynn Wheeler
Warning! New cryptographic modes!
Jerry Leichter
Re: Warning! New cryptographic modes!
Matt Ball
Re: Warning! New cryptographic modes!
Roland Dowdeswell
Re: Warning! New cryptographic modes!
Jerry Leichter
Re: Warning! New cryptographic modes!
Matt Ball
Re: Warning! New cryptographic modes!
Jerry Leichter
Re: Warning! New cryptographic modes!
Victor Duchovni
Re: Warning! New cryptographic modes!
Jerry Leichter
Re: Warning! New cryptographic modes!
Jerry Leichter
Re: Warning! New cryptographic modes!
silky
Re: Warning! New cryptographic modes!
Jerry Leichter
Re: Warning! New cryptographic modes!
silky
Earlier messages
Later messages