Matt Blaze <mab@crypto.com> (93 posts)

Be aware that many list participants used multiple email addresses over their time active on the list. As such this page may not contain all threads available.

Threads

The Halting Problem

Re: The Halting Problem

Say again?

Re: CERT: the letter from CERT to berkeley.edu admin

Privacy panel at USENIX Conference

Beepers can also be used to track you down!

The Zen of Anonymity

network parallel decryption amateur style

Re: meaningless rumor

my clipper letter

FAX # for Clipper Comments

Re: Disturbing statistics on wiretaps

Re: Warning about exposing anon id

Re: ADMIN: proposed new policy on the mailing list

Re: ADMIN: proposed new policy on the mailing list

Can NSA crack PGP?

CFS (was Re: Will Mike Ingle’s name be a household word like “Buttafuoco”?)

Distribution of Secure Drive

Re: Anonymous Video on Demand

Re: iPower card info from NatSemi

Re: dispersed DES

Re: dispersed DES

Re: Idle question…

Re: No SKE in Daytona and other goodies

cfs & remailers

Re: School Admins

Re: Zimmermann interrogated without counsel

swIPe

Re: Making sure a program gets to the receiver intact

Re: Why I have a 512 bit PGP key

Book review: Codebreakers, the Inside Story of Bletchley Park

Telnet Acrobatics

Re: ESP Unix encrypted session protocol software

Re: ESP Unix encrypted session protocol software

The SKRONK protocols (version 0.6)

Global Filesystem Guild

why pgp sucks

the problem that destroyed PGP

Re: Factoring - State of the Art and Predictions

Re: Unix not the Only Place for “Vanguard” Applications

Re: a hole in PGP

Attacks on PGP

“S1” encryption system (was: this looked like it might be interesting)

“S-1” key schedule

More “S-1” foolishness

Re: More “S-1” foolishness

Still more “S-1” foolishness

Re: More “S-1” foolishness

Re: `Random’ seed.

Netscpae & Fortezza (Or, say it Ain’t so, Jeff?)

my favorite random-numbers-in-software package (unix)

Re: my favorite random-numbers-in-software package (unix)

Crypto APIs

Netscape Logic Bomb detailed by IETF

New release of CFS Unix encrypting file system available

DigiCrime web page

Re: New release of CFS Unix encrypting file system available

Remind me why we’re so mad at Netscape

Timing Cryptanalysis Attack

Timing Attacks

Re: Attacking Clipper with timing info?

Re: revised time quantization package (Unix & WIN32) available

CFS and Linux

Re: CFS and Linux (fwd)

Re: Revoking Old Lost Keys

Zimmermann case is dropped.

RC2 technical questions

DES_ono

My letter to Leahy supporting the crypto bill

Lawz to be.

Re: Lawz to be.

[SCARE]: “If you only knew what we know…”

My testimony at Wednesday’s Senate hearing on encryption policy

My testimony at Wednesday’s Senate hearing on encryption policy

NSA response to key length report

Re: Borders are transparent

appropriate algorithm for application

1997 USENIX Technical Conference info

Better DES challenge update