- cryptography
- 2006-06-01 - 2006-07-01 (116 messages)
- 2006-05-01 - 2006-06-01 (156 messages)
- 2006-04-01 - 2006-05-01 (99 messages)
Next Last
1. 2006-05-31 [8] Status of SRP cryptogra Florian Weime
2. 2006-05-31 [1] Elizabethan traffic analysis cryptogra Steven M. Bel
3. 2006-05-31 [6] Status of opportunistic encryption cryptogra Victor Duchov
4. 2006-05-27 [1] Hayden's statement from Oct 2002 on liberty and secur cryptogra John Gilmore
5. 2006-05-25 [4] Phil Zimmerman and voice encryption; a Skype problem? cryptogra Adler, Joseph
6. 2006-05-25 [1] Algebraic Attacks on Block Ciphers cryptogra James Muir
7. 2006-05-25 [9] Is AES better than RC4 cryptogra Joseph Ashwoo
8. 2006-05-24 [1] Re: [!! SPAM] Re: Is AES better than RC4 cryptogra Joseph Ashwoo
9. 2006-05-24 [7] Secure phones from VectroTel? cryptogra mis
10. 2006-05-22 [3] Crypto hardware with secure key storage cryptogra Jonathan Thor
11. 2006-05-20 [5] statistical inferences and PRNG characterization cryptogra David Malone
12. 2006-05-19 [1] May 24: National Day of Outrage at NSA/Telco surveill cryptogra John Gilmore
13. 2006-05-19 [1] New UK law makes a wide range of software illegal. cryptogra Perry E. Metz
14. 2006-05-19 [2] UK Government to force disclosure of encryption keys. cryptogra Roy M. Silver
15. 2006-05-19 [15] NSA knows who you've called. cryptogra Steve Schear
16. 2006-05-18 [2] Political Cartoon of the Day cryptogra Ben Pfaff
17. 2006-05-18 [7] the meaning of linearity, was Re: picking a hash func cryptogra Travis H.
18. 2006-05-17 [1] "It's funny because it's true..." cryptogra Perry E. Metz
19. 2006-05-17 [1] PET 2006: Call for Participation cryptogra George Danezi
20. 2006-05-17 [1] IPICS summer course in Computer Security cryptogra George Danezi
21. 2006-05-16 [1] Elliptic Curve Cryptography (ECC) Cipher Suites for T cryptogra Anne & Lynn W
22. 2006-05-16 [10] picking a hash function to be encrypted cryptogra Eric Rescorla
23. 2006-05-16 [1] anyone have "New Hash Functions and their Use in Auth cryptogra Travis H.
24. 2006-05-15 [1] Government using call records to go after reporter's cryptogra Perry E. Metz
25. 2006-05-15 [6] Piercing network anonymity in real time cryptogra leichter_jerr
26. 2006-05-15 [1] Surprise! Another serious hole in Diebold voting mac cryptogra Bill Squier
27. 2006-05-15 [1] Re: the meaning of linearity cryptogra Florian Weime
28. 2006-05-13 [1] Bamford on the NSA and the Greek mobile phone tapping cryptogra John Ioannidi
29. 2006-05-13 [2] There are no limits to human stupidity. cryptogra Florian Weime
30. 2006-05-13 [8] Status of attacks on AES? cryptogra Max
Next Last
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic