norm@netcom.com (Norman Hardy) (153 posts)

Be aware that many list participants used multiple email addresses over their time active on the list. As such this page may not contain all threads available.

Threads

Re: digital banking

Politics of Rmailers

Re: REMAIL: cypherpunks strategy

Trusting PGP

Hellman’s Hints

Webs of Trust vs Trees of Trust

Webs of Trust vs Trees of Trust

Anonymous Remailers, WB etc.

If strong crypto were illegal

If strong crypto were illegal

Early Battles

Steganography

Re: CryptoStacker, long term vision

CERT netnews

DigiCash

Names and Reputations

Re: Names and Reputations

Diffie Hellman

Diffie-Hellman Weakness Weakness

Digital Silk Road

Re: Digital Silk Road

Digital Silk Road

Digital Silk Road (Yet once more)

ftp access to the Silk Road Paper

NSA and Trust Webs

Re: Software Patent Institute

Re: Secure voice software issues

Re: Secure voice software issues

Re: Source Code NOT available for ViaCrypt PGP

Re: Source Code NOT available for ViaCrypt PGP

Re: Commercial PGP: Verifying Trustworthiness

Re: Commercial PGP: Verifying Trustworthiness

Re: Commercial PGP: Verifying Trustworthiness

Re: Commercial PGP: Verifying Trustworthiness

Remailer Reliability

Re: Stegno and DAT and digital music…

Abstract: of The Digital Silk Road

How to use cipher programs without trusting them.

Re: Paper Shredders

Shamir Sharing

Error in Shamir sharing

ViaCrypt PGP

Re: Should we oppose the Data Superhighway/NII?

RSA’s phone number

Hut six

Re: why govt’s get bigger

Re: RSA Questions

Re: APPLIED CRYPTOGRAPHY - Index

Re: Where can I get RFC-822?

Re: Remailers: The Next Generation

Magic Money ftp

Re: Clipper and Traffic Analysis

Re: cypherpunks meeting in Mt. View last weekend.

Re:

Re: REAL WORLD ENCRYPTION

Re: Infomercial

Re: standard for steganography?

Re: standard for steganography?

Format of PGP ciphered message

Re: Format of PGP ciphered message

Re: Web of Trust?

RE: Pseudonyms and Reputations

Zero Knowledge, Hamiltonian Cycles, and Passwords

Re: Warrentlesss SEarches (fwd)

Re: Patents on RSA will expire soon….

Re: This is an abstract from a talk at Cornell University…

No Subject

Re: MIT TOC SEMINAR–ADI SHAMIR–MONDAY–MAY 16–4:15pm

Re: Rabin decryption

Re: Trust Models

Re: Graph isomorphism based PK cryptosystems?

Re: Graph isomorphism based PK cryptosystems?

Re: The Illogic of Clipper

Patent Numbers

Re: Archives?

Re: Dr. Dobbs Dev. Update 1/5 July 94 & Schneier

Re: Pass Phrases

Re: Remailers

Re: (fwd) Re: BSD random() - any good (source included)?

Re: Idle question…

Re: Triple encryption…

Re: Double DES calculations

Re: CYPHERPUNKS TO THE RESCUE

Re: CYPHERPUNKS TO THE RESCUE

Re: CYPHERPUNKS TO THE RESCUE

Re: IDEA vs DES

Re: Direct Satellite phone service

Re: IDEA vs DES

Re: Secret sharing made short

Re: DSPs

Force is not physical

Re: Transparent Email (WAS disable telnet to port 25)

How to not have to trust CAs

MacPGP

MacPGP

Re: IPSP

Re: another factoring thing. . . .

Re: Identity

No Subject

Re: Protocols for a Data Bank

Re: Protocols for a Data Bank

Re: Data Bank

Data Bank Protocols

Re: ESP Unix encrypted session protocol software

Re: ESP Unix encrypted session protocol software

Re: Billing for internet usage

Re: Netscape SSL implementation is broken!

Re: NSA and Netscape Crack

Pitfall in producing random numbers

Re: Patents and trade secrets was: Encryption algorithms used in PrivaSoft (fwd)

Re: “random” number seeds vs. Netscape

MD4 collision

The Evolution of Cooperation (Towards a mathematical theory of reputation?)

Re: Simple Hardware RNG Idea

Re: Simple Hardware RNG Idea

Using deterministic programs to select private RSA keys.

Re: Using deterministic programs to select private RSA keys.

Re: Simple Hardware RNG Idea

Re: Request for URL’S

Re: Good Enough?

Re: Virus attacks on PGP

Learning Elliptic Curves

Re: Elliptic curves, current status?

Re: Elliptic curves, current status?

Re: Netscape gives in to key escrow

URL for cypherpunks

A Mondex like Protocol

Re: cyphernomicon FTP site?

A Mondex like Protocol (2)

“trust management” vs. “certified identity”

The cost of breaking RC4 with a 40 bit key.

cipherpunk mail at Netcom.com

Money & CreditCard URLs

Counting bits Fast

Re: SET spec available

Re: WSJ on Big Java Flaw

Re: Why sign pubkey?

Re: trusting the processor chip

URLs for Capabilities

Re: Runtime info flow in Java

Re: [hrdware] anti-Tempest video settings

Re: Runtime info flow in Java

Re: Fate of Ecash if RSA is cracked?

Class III InfoWar: TST Article

If you knew what we knew …

Re: Class III InfoWar: TST Article

Re: NYT/CyberTimes on CWD article

Re: Metered Phone

Re: 56 kbps modems

Re: What is best policy paper on crypto?

Re: Gaining trust in OCO crypto code

Re: Weaknesses in Smart Cards? (Re: FLA_wed)

Re: Weaknesses in Smart Cards? (Re: FLA_wed)