Next Last 1. 2006-05-31 [8] Status of SRP cryptography Florian Weimer 2. 2006-05-31 [1] Elizabethan traffic analysis cryptography Steven M. Bellovin 3. 2006-05-31 [6] Status of opportunistic encryption cryptography Victor Duchovni 4. 2006-05-27 [1] Hayden's statement from Oct 2002 on liberty and security cryptography John Gilmore 5. 2006-05-25 [4] Phil Zimmerman and voice encryption; a Skype problem? cryptography Adler, Joseph 6. 2006-05-25 [1] Algebraic Attacks on Block Ciphers cryptography James Muir 7. 2006-05-25 [9] Is AES better than RC4 cryptography Joseph Ashwood 8. 2006-05-24 [1] Re: [!! SPAM] Re: Is AES better than RC4 cryptography Joseph Ashwood 9. 2006-05-24 [7] Secure phones from VectroTel? cryptography mis 10. 2006-05-22 [3] Crypto hardware with secure key storage cryptography Jonathan Thornburg 11. 2006-05-20 [5] statistical inferences and PRNG characterization cryptography David Malone 12. 2006-05-19 [1] May 24: National Day of Outrage at NSA/Telco surveillance cryptography John Gilmore 13. 2006-05-19 [1] New UK law makes a wide range of software illegal. cryptography Perry E. Metzger 14. 2006-05-19 [2] UK Government to force disclosure of encryption keys. cryptography Roy M. Silvernail 15. 2006-05-19 [15] NSA knows who you've called. cryptography Steve Schear 16. 2006-05-18 [2] Political Cartoon of the Day cryptography Ben Pfaff 17. 2006-05-18 [7] the meaning of linearity, was Re: picking a hash function to be encrypte cryptography Travis H. 18. 2006-05-17 [1] "It's funny because it's true..." cryptography Perry E. Metzger 19. 2006-05-17 [1] PET 2006: Call for Participation cryptography George Danezis 20. 2006-05-17 [1] IPICS summer course in Computer Security cryptography George Danezis 21. 2006-05-16 [1] Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer cryptography Anne & Lynn Wheeler 22. 2006-05-16 [10] picking a hash function to be encrypted cryptography Eric Rescorla 23. 2006-05-16 [1] anyone have "New Hash Functions and their Use in Authentication and Set cryptography Travis H. 24. 2006-05-15 [1] Government using call records to go after reporter's sources. cryptography Perry E. Metzger 25. 2006-05-15 [6] Piercing network anonymity in real time cryptography leichter_jerrold 26. 2006-05-15 [1] Surprise! Another serious hole in Diebold voting machines... cryptography Bill Squier 27. 2006-05-15 [1] Re: the meaning of linearity cryptography Florian Weimer 28. 2006-05-13 [1] Bamford on the NSA and the Greek mobile phone tapping scandal cryptography John Ioannidis 29. 2006-05-13 [2] There are no limits to human stupidity. cryptography Florian Weimer 30. 2006-05-13 [8] Status of attacks on AES? cryptography Max Next Last