- cryptography
- 2008-05-01 - 2008-06-01 (162 messages)
- 2008-04-01 - 2008-05-01 (98 messages)
- 2008-03-01 - 2008-04-01 (90 messages)
1. 2008-04-30 [1] Microsoft COFEE cryptogra Arshad Noor
2. 2008-04-30 [2] privacy expectations Was: SSL and Malicious Hardware/ cryptogra Steven M. Bel
3. 2008-04-30 [1] Hagelin cipher machine on EBay cryptogra Steven M. Bel
4. 2008-04-29 [19] "Designing and implementing malicious hardware" cryptogra James A. Dona
5. 2008-04-29 [3] Doubts about efficiency of Shor's factoring algorithm cryptogra Ray Perlner
6. 2008-04-29 [7] defending against evil in all layers of hardware and cryptogra Jonathan Thor
7. 2008-04-29 [3] Declassified NSA publications cryptogra Ilya Levin
8. 2008-04-29 [4] SSL and Malicious Hardware/Software cryptogra Jack Lloyd
9. 2008-04-29 [1] Shor's algorithm in danger? cryptogra Rod Van Meter
10. 2008-04-29 [4] Just update the microcode (was: Re: defending against cryptogra Sebastian Kra
11. 2008-04-28 [5] more on malicious hardware cryptogra Scott Guthery
12. 2008-04-27 [1] matt blaze on evil hardware cryptogra Perry E. Metz
13. 2008-04-24 [4] [Fwd: Secure Server e-Cert & Developer e-Cert. Comeri cryptogra Peter Gutmann
14. 2008-04-24 [10] Cruising the stacks and finding stuff cryptogra Ian G
15. 2008-04-23 [2] no possible brute force Was: Cruising the stacks and cryptogra Leichter, Jer
16. 2008-04-22 [2] Snake oil crypto of the day: BabelSecure Samurai cryptogra james hughes
17. 2008-04-22 [2] Estimated 10 million dollars lost in parking meter fr cryptogra James Muir
18. 2008-04-21 [1] quantum cryptography broken? cryptogra travis+ml-cry
19. 2008-04-20 [1] TextTell - 1983 - Encrypted Text Transmission cryptogra Nap van Zuure
20. 2008-04-18 [5] 2factor cryptogra Steven M. Bel
21. 2008-04-18 [4] Double Encryption Q cryptogra Martin James
22. 2008-04-18 [1] Mark Dowd's Flash NULL Pointer Vulnerability Exploit cryptogra Ryan Phillips
23. 2008-04-17 [1] New results against the Mifare cipher cryptogra Peter Gutmann
24. 2008-04-17 [4] Re: Levels of security according to the easiness to s cryptogra Arshad Noor
25. 2008-04-16 [2] Still locked up Shannon crypto work? cryptogra Steven M. Bel
26. 2008-04-16 [5] Re: how to read information from RFID equipped credit cryptogra Nicolas Willi
27. 2008-04-13 [1] Pi, randomness, entropy, unpredictability cryptogra travis+ml-cry
28. 2008-04-08 [1] Privacy as Contextual Integrity - A lecture by Dr. Ni cryptogra Ali, Saqib
29. 2008-04-01 [1] Re: Want to drive a Jaguar? cryptogra Stefan Kelm
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic