solman@MIT.EDU (65 posts)

Be aware that many list participants used multiple email addresses over their time active on the list. As such this page may not contain all threads available.

Threads

How broad are PKP’s patents?

Probabilistic Encryption

Why triple encryption instead of split+encrypt?

Key length security (calculations!)

Re: Probabilistic Encryption

Re: Card Playing Protocol?

Re: Key length security (calculations!)

Probabilistic encryption works!

Re: Why triple encryption instead of split+encrypt?

Re: Why triple encryption instead of split+encrypt?

Re: Why triple encryption instead of split+encrypt?

Re: Why triple encryption instead of split+encrypt?

Clipper Chip retreat

Re: Voice/Fax Checks

Re: Voice/Fax Checks

Re: No more Cantwell amendment? was Re: Clipper Chip retreat

“Key Escrow” — the very idea

Re: Voice/Fax Checks

Re: Voice/Fax Checks

Gore’s “new and improved” key escrow proposal

Re: Voice/Fax Checks

Pantent archive?

Re: Voice/Fax Checks

Re: “Just say ‘No’ to key escrow.”

Re: Anonymous code name allocated. // penet hack

Truth, Justice, and the Waco Way

anonymous anonymous remailers?

Re: anonymous anonymous remailers?

Voluntary Governments?

Re: Voluntary Governments?

Re: Voluntary Governments?

No Subject

Re: e$

ccc [alt.suicide.holiday #18856]

Force is not physical

Re: Problems with anonymous escrow 2–response

Is the following digicash protocol possible?

Cabel TV’s new specs require leaky encryption

Re: Anyone seen the ‘quantum cryptanalysis’ thread?

archives

URGENT - MS hack of FFS

Re: Java, Netscape, OpenDoc, and Babel (NewsClip)

Java, Netscape, OpenDoc, and Babel

Re: Java, Netscape, OpenDoc, and Babel

RSA has been proved correct

“S1” encryption system (was: this looked like it might be interesting)

Legality of suverting computational cycles via Microsoft

Re: DES & RC4-48 Challenges

question about reputation

Cypher secure versus computationally unbounded adversary

Secure versus ?

Executing Encrypted Code

New crypto regulations