- cryptography
- 2006-06-01 - 2006-07-01 (116 messages)
- 2006-05-01 - 2006-06-01 (156 messages)
- 2006-04-01 - 2006-05-01 (99 messages)
Next Last
1. 2006-05-31 [8] Status of SRP cryptograph Florian Weimer
2. 2006-05-31 [1] Elizabethan traffic analysis cryptograph Steven M. Bellov
3. 2006-05-31 [6] Status of opportunistic encryption cryptograph Victor Duchovni
4. 2006-05-27 [1] Hayden's statement from Oct 2002 on liberty and security cryptograph John Gilmore
5. 2006-05-25 [4] Phil Zimmerman and voice encryption; a Skype problem? cryptograph Adler, Joseph
6. 2006-05-25 [1] Algebraic Attacks on Block Ciphers cryptograph James Muir
7. 2006-05-25 [9] Is AES better than RC4 cryptograph Joseph Ashwood
8. 2006-05-24 [1] Re: [!! SPAM] Re: Is AES better than RC4 cryptograph Joseph Ashwood
9. 2006-05-24 [7] Secure phones from VectroTel? cryptograph mis
10. 2006-05-22 [3] Crypto hardware with secure key storage cryptograph Jonathan Thornbu
11. 2006-05-20 [5] statistical inferences and PRNG characterization cryptograph David Malone
12. 2006-05-19 [1] May 24: National Day of Outrage at NSA/Telco surveillance cryptograph John Gilmore
13. 2006-05-19 [1] New UK law makes a wide range of software illegal. cryptograph Perry E. Metzger
14. 2006-05-19 [2] UK Government to force disclosure of encryption keys. cryptograph Roy M. Silvernai
15. 2006-05-19 [15] NSA knows who you've called. cryptograph Steve Schear
16. 2006-05-18 [2] Political Cartoon of the Day cryptograph Ben Pfaff
17. 2006-05-18 [7] the meaning of linearity, was Re: picking a hash function cryptograph Travis H.
18. 2006-05-17 [1] "It's funny because it's true..." cryptograph Perry E. Metzger
19. 2006-05-17 [1] PET 2006: Call for Participation cryptograph George Danezis
20. 2006-05-17 [1] IPICS summer course in Computer Security cryptograph George Danezis
21. 2006-05-16 [1] Elliptic Curve Cryptography (ECC) Cipher Suites for Transp cryptograph Anne & Lynn Whee
22. 2006-05-16 [10] picking a hash function to be encrypted cryptograph Eric Rescorla
23. 2006-05-16 [1] anyone have "New Hash Functions and their Use in Authentic cryptograph Travis H.
24. 2006-05-15 [1] Government using call records to go after reporter's sourc cryptograph Perry E. Metzger
25. 2006-05-15 [6] Piercing network anonymity in real time cryptograph leichter_jerrold
26. 2006-05-15 [1] Surprise! Another serious hole in Diebold voting machines cryptograph Bill Squier
27. 2006-05-15 [1] Re: the meaning of linearity cryptograph Florian Weimer
28. 2006-05-13 [1] Bamford on the NSA and the Greek mobile phone tapping scan cryptograph John Ioannidis
29. 2006-05-13 [2] There are no limits to human stupidity. cryptograph Florian Weimer
30. 2006-05-13 [8] Status of attacks on AES? cryptograph Max
Next Last
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic