JMKELSEY@delphi.com (27 posts)
Be aware that many list participants used multiple email addresses over their time active on the list. As such this page may not contain all threads available.
Threads
Time-memory tradeoff in SSL’s RC4 code?
Export policy change
Anonymous certificates
Why 64 bit keys?
- 1995-08-22 (Mon, 21 Aug 95 17:18:13 PDT) - Why 64 bit keys? - JMKELSEY@delphi.com
MD4-derived hash functions
public random numbers
wiretaping ability and future plans
video as a source of public randomness
No Subject
- 1995-11-14 (Tue, 14 Nov 1995 19:37:59 +0800) - No Subject - JMKELSEY@delphi.com
Re: GOST for sale
- 1995-11-29 (Thu, 30 Nov 1995 07:49:53 +0800) - Re: GOST for sale - JMKELSEY@delphi.com
Limiting Reuse of Certificates
Lotus Notes
- 1996-01-25 (Thu, 25 Jan 1996 11:31:19 +0800) - Lotus Notes - JMKELSEY@delphi.com
Re: Lotus Notes
- 1996-01-26 (Fri, 26 Jan 1996 14:13:11 +0800) - Re: Lotus Notes - JMKELSEY@delphi.com
- 1996-01-26 (Fri, 26 Jan 1996 17:10:01 +0800) - Re: Lotus Notes - Simon Spero <ses@tipper.oit.unc.edu>
CAs and Digital Timestamping
This post is rated LTC for `Low Technical Content’
RC2–Some very preliminary analysis
RC2’s key schedule and passphrase hashing
POTP Jr.
- 1996-03-09 (Sat, 9 Mar 1996 13:06:17 +0800) - POTP Jr. - JMKELSEY@delphi.com
Re: numbers don’t lie
Escrowing signing vs. encryption keys
anonymous mailing lists
Re: anonymous remailers
Re: anonymous remailers
No Subject
- 1996-07-24 (Thu, 25 Jul 1996 05:36:31 +0800) - No Subject - JMKELSEY@delphi.com
Paranoid Musings
- 1996-08-03 (Sat, 3 Aug 1996 13:04:22 +0800) - Paranoid Musings - JMKELSEY@delphi.com
Dealing with junk mail
Copyright protection schemes discussed at ESORICS