Search: 
[] List [] Subjects [] Authors [] Bodies for list 'cryptography-randombit'
Set Page Width: [ 80 ] [ 90 ] [ 100 ] [ 120 ]
Viewing messages in list cryptography-randombit
- 2012-11-01 - 2012-12-01 (72 messages)
- 2012-10-01 - 2012-11-01 (180 messages)
- 2012-09-01 - 2012-10-01 (76 messages)
  1. 2012-10-31  [3] [cryptography] Application Layer Encryption Protocols Tuned for Cellular cryptography Peter Gutmann 
  2. 2012-10-31  [2] [cryptography] hashed passwords, iteration counts, and PBKDF2            cryptography Jon Callas 
  3. 2012-10-31 [38] [cryptography] Just how bad is OpenSSL ?                                 cryptography Jeffrey Walton 
  4. 2012-10-30  [5] Re: [cryptography] Your GPU's ???Fingerprint??? Could Lead to New Securi cryptography Jonas Wielicki 
  5. 2012-10-30  [2] [cryptography] =?utf-8?b?WW91ciBHUFUncyDigJxGaW5nZXJwcmludOKAnSBD?= =?ut cryptography Beryl Lusen 
  6. 2012-10-28 [15] [cryptography] anyone got a "how not to use OpenSSL" list?               cryptography Ben Laurie 
  7. 2012-10-26 [20] [cryptography] DKIM: Who cares?                                          cryptography Jim Fenton 
  8. 2012-10-26  [1] Re: [cryptography] DKIM makes Wired                                      cryptography Peter Gutmann 
  9. 2012-10-21  [1] [cryptography] OT: Why Eve and Mallory Love Android: An Analysis of Andr cryptography Jeffrey Walton 
 10. 2012-10-19 [12] [cryptography] Secure Remote Password (SRP) and Plaintext Emil Address   cryptography Jim Fenton 
 11. 2012-10-16 [21] [cryptography] Client certificate crypto with a twist                    cryptography Guido Witmond 
 12. 2012-10-14  [5] [cryptography] Social engineering attacks on client certificates (Was .. cryptography Jeffrey Walton 
 13. 2012-10-13  [4] Re: [cryptography] best way to create entropy?                           cryptography Warren Kumari 
 14. 2012-10-12  [4] Re: [cryptography] [tor-dev] Even more notes on relay-crypto constructio cryptography Eugen Leitl 
 15. 2012-10-10  [2] Re: [cryptography] Inappropriate Use of Adobe Code Signing Certificate   cryptography Jeffrey Walton 
 16. 2012-10-08  [3] [cryptography] The lesser-known public key in embedded devices           cryptography Peter Gutmann 
 17. 2012-10-06  [1] Re: [cryptography] uses for Crypto Tutorial.....                         cryptography Joseph Tag 
 18. 2012-10-06  [2] [cryptography] I downloaded the TOR Browser pack for Windows today       cryptography James A. Donald 
 19. 2012-10-05  [8] [cryptography] cjdns review                                              cryptography Jonas Wielicki 
 20. 2012-10-05  [2] Re: [cryptography] [liberationtech] CryptoParty Handbook                 cryptography Eugen Leitl 
 21. 2012-10-04  [8] [cryptography] Fwd: NIST Selects Winner of Secure Hash Algorithm (SHA-3) cryptography Aaron Toponce 
 22. 2012-10-04 [10] [cryptography] ZFS dedup? hashes (Re: [zfs] SHA-3 winner announced)      cryptography Eugen Leitl 
 23. 2012-10-03  [1] [cryptography] Reaction to SHA-3 announcement                            cryptography Kevin W. Wall 
 24. 2012-10-03  [8] [cryptography] [zfs] SHA-3 winner announced                              cryptography Nico Williams 

Configure | About | News | Add a list | Sponsored by KoreLogic