September 2013 Archives by thread
Starting: Sun Sep 1 12:45:46 EDT 2013
Ending: Mon Sep 30 22:00:12 EDT 2013
Messages: 347
- [cryptography] Authenticated Time Synchronization
Stephen Röttger
- [cryptography] Eccentricity: How Hard to Crack a Cryptosystem
John Young
- [cryptography] [Cryptography] IPv6 and IPSEC
John Levine
- [cryptography] TLS renegotiation patch rollout progress
ianG
- [cryptography] regarding the NSA crypto "breakthrough"
coderman
- [cryptography] what has the NSA broken?
Andy Isaacson
- [cryptography] Bruce Schneier on BULLRUN and related NSA programs
coderman
- [cryptography] Eccentric Authentication again
Guido Witmond
- [cryptography] integer automata networks for PRNG
Eugen Leitl
- [cryptography] Matthew Green: An understated response to the NSA and unidentifed friends treachery
John Young
- [cryptography] FBI OpenBSD Backdoors and RSA Cipher Vulnerability
John Young
- [cryptography] [Cryptography] Opening Discussion: Speculation on "BULLRUN"
Eugen Leitl
- [cryptography] Random number generation influenced, HW RNG
grarpamp
- [cryptography] Compositing Ciphers?
Jeffrey Walton
- [cryptography] [liberationtech] Random number generation being influenced - rumors
Eugen Leitl
- [cryptography] [tor-talk] NIST approved crypto in Tor?
Eugen Leitl
- [cryptography] Political Cypherpunks Trumps Apolitical Cryptography
Eugen Leitl
- [cryptography] NSA can spy on smart phone data
ianG
- [cryptography] urandom vs random
David Johnston
- [cryptography] very little is missing for working BTNS in Openswan
Eugen Leitl
- [cryptography] SSH uses secp256/384r1 which has the same parameters as what's in SEC2 which are the same the parameters as specified in SP800-90 for Dual EC DRBG!
Eugen Leitl
- [cryptography] IETF: Security and Pervasive Monitoring
Eugen Leitl
- [cryptography] Cryptography] Der Spiegel: "NSA Can Spy on Smart Phone Data"
Nap van Zuuren
- [cryptography] Backdoors in software
john espiro
- [cryptography] [Cryptography] Random number generation influenced, HW RNG
Eugen Leitl
- [cryptography] [Cryptography] The One True Cipher Suite
Eugen Leitl
- [cryptography] [cryptome] Interesting
John Young
- [cryptography] Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?
Fabio Pietrosanti (naif)
- [cryptography] Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?
Adam Back
- [cryptography] Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?
David D
- [cryptography] Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?
Lodewijk andré de la porte
- [cryptography] Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?
Jurre andmore
- [cryptography] : forensic search technology
Tomas Overdrive Petru
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
Adam Back
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
John Kemp
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
David D
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
David D
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
ianG
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
Jeffrey Goldberg
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
Jeffrey Walton
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
David D
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
coderman
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
ianG
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
Jeffrey Goldberg
- [cryptography] motivation, research ethics & organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)
Peter Maxwell
- [cryptography] ProPublica's Jeff Larson on the NSA Crypto Story and Another View
John Young
- [cryptography] What is "Security World" architecture?
Jeffrey Walton
- [cryptography] SPDZ, a practical protocol for Multi-Party Computation
Eugen Leitl
- [cryptography] NIST reopens RNG public comment period
Eugen Leitl
- [cryptography] Fwd: Shadow Hardening
Gutem
- [cryptography] Stealthy Dopant-Level Hardware Trojans
Eugen Leitl
- [cryptography] MITM Manipulation of Snowden Documents
John Young
- [cryptography] no-keyring public
Samuel Neves
- [cryptography] [Cryptography] the introduction problem, was prism proof email, namespaces, and anonymity
John Levine
- [cryptography] [Bitcoin-development] REWARD offered for hash collisions for SHA1, SHA256, RIPEMD160 and others
Peter Todd
- [cryptography] [Cryptography] prism proof email, namespaces, and anonymity
Adam Back
- [cryptography] Asynchronous forward secrecy encryption
Marco Pozzato
- [cryptography] Fatal flaw in Taiwanese smart card RNG
John Kemp
- [cryptography] It's time for a Whistleblowing / Leaking Initiative for Cryptographer ?
Fabio Pietrosanti (naif)
- [cryptography] Breaking a CPU’s internal cryptographic mechanisms
Gutem
- [cryptography] [liberationtech] "Ibis: An Overlay Mix Network for Microblogging" by Ian Goldberg
Eugen Leitl
- [cryptography] [Cryptography] RSA equivalent key length/strength
Lucky Green
- [cryptography] Introducing TDMX - Trusted Domain Messaging eXchange (Specification)
pjklauser at gmail.com
- [cryptography] Image hash function
shawn wilson
- [cryptography] Using same key for ECDSA and ECIES
Dominik Schürmann
- [cryptography] News from Eric Hughes
jd.cypherpunks at gmail.com
- [cryptography] What is Intel® Core™ vPro™ Technology Animation
d.nix
- [cryptography] NSA Files: overview of published documents and films // Der Spiegel
Nap van Zuuren
- [cryptography] LINKS ADDED // NSA Files: overview of published documents and films // Der Spiegel
Nap van Zuuren
- [cryptography] Chaos theory
Collin RM Stocks
- [cryptography] Dual_EC_DRBG was cooked, but not AES?
Ed Stone
- [cryptography] [Cryptography] What is Intel(R) Core™ vPro™ Technology Animation
Jeffrey Walton
- [cryptography] Fwd: Re: What is Intel® Core™ vPro™ Technology Animation
d.nix
- [cryptography] Attack Driven Defense - infosec rant [was: What is Intel(R) Core™ vPro™ Technology Animation]
coderman
- [cryptography] Popular Deification of Transmission- and Crypto-Security
John Young
- [cryptography] Dissentr: A High-Latency Overlay Mix Network
Eugen Leitl
- [cryptography] forward-secrecy >=2048-bit in legacy browser/servers? (Re: [Cryptography] RSA equivalent key length/strength)
Adam Back
- [cryptography] The Unbreakable Cipher
John Young
- [cryptography] Snowden walked away with the U.S. IC Intellipedia
John Young
- [cryptography] The Unbreakable Cipher (2)
Eugen Leitl
- [cryptography] Opinions on Internet Privacy
ianG
- [cryptography] One Time Pad Cryptanalysis
John Young
- [cryptography] design and implementation of "replay prevention windows"
coderman
- [cryptography] What the heck is going on with NIST’s cryptographic standard, SHA-3?
Eugen Leitl
- [cryptography] NSA IDA Cryptological Research Centers
John Young
- [cryptography] A question about public keys
Michael Rogers
- [cryptography] [Cryptography] TLS2
Adam Back
- [cryptography] three crypto lists - why and which
Adam Back
- [cryptography] TLS2
ianG
Last message date:
Mon Sep 30 22:00:12 EDT 2013
Archived on: Mon Sep 30 22:06:59 EDT 2013
This archive was generated by
Pipermail 0.09 (Mailman edition).