Re: Examining the Encryption Threat

2004-05-28 Thread Peter Gutmann
"Peter Parker" <[EMAIL PROTECTED]> writes: >In one of the issue of ijde found at >http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have analysed >various encryption applications and discussed results for few sample >applications. Does any one have the complete results. Tried mailing th

Examining the Encryption Threat

2004-05-28 Thread Peter Parker
Hi, In one of the issue of ijde found at http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have analysed various encryption applications and discussed results for few sample applications. Does any one have the complete results. Tried mailing the author but no response. Any one having fu