# sci.crypt

**Mark-Up Cryptography or Encapsulation Cryptography.**,*adacrypt***CFP Applied Computing 2010: submissions until 28 May 2010**,*natty2006@xxxxxxxxx***Chambal et al**,*WTShaw***Re: Chambal et al**,*Mok-Kong Shen*

**Public Key Size in ECDSA**,*Eddie***Re: Public Key Size in ECDSA**,*Tom St Denis*

**Scripting Ciphers.**,*adacrypt***bad client public DH value**,*yawnmoth***Re: bad client public DH value**,*Ertugrul Söylemez***Re: bad client public DH value**,*Peter Pearson*

**Steganography Software**,*jmorton123***Re: Steganography Software**,*Gordon Burditt***Re: Steganography Software**,*Mok-Kong Shen***Re: Steganography Software**,*Maaartin***Re: Steganography Software**,*Mok-Kong Shen***Re: Steganography Software**,*Maaartin***Re: Steganography Software**,*Mok-Kong Shen***Re: Steganography Software**,*Maaartin***Re: Steganography Software**,*Mok-Kong Shen*

**Re: Steganography Software**,*bmearns*

**Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*WTShaw***Re: Call for review: Hashing by hand algorithm**,*bmearns*- <Possible follow-ups>
**Re: Call for review: Hashing by hand algorithm**,*WTShaw***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*MrD***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*Maaartin***Re: Call for review: Hashing by hand algorithm**,*J.D.***Re: Call for review: Hashing by hand algorithm**,*bmearns***Re: Call for review: Hashing by hand algorithm**,*J.D.*

**An application of indirectness and variability**,*Mok-Kong Shen***PE Scrambler**,*balzer***Re: PE Scrambler**,*unruh***Re: PE Scrambler**,*Ertugrul Söylemez***Re: PE Scrambler**,*Mok-Kong Shen*

**Re: PE Scrambler**,*Mok-Kong Shen***Re: PE Scrambler**,*balzer***Re: PE Scrambler**,*Mok-Kong Shen***Re: PE Scrambler**,*balzer*

**Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Bryan***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Maaartin***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Bryan***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Bryan***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Maaartin***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Maaartin***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Maaartin***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Bryan***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Bryan***Re: Dynamic Hill cipher**,*Maaartin***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Scott Fluhrer***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Scott Fluhrer***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Scott Fluhrer***Re: Dynamic Hill cipher**,*Mok-Kong Shen*

**Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Mok-Kong Shen***Re: Dynamic Hill cipher**,*Tom St Denis*

**Public/Public**,*Peter Fairbrother***Re: Public/Public**,*Mok-Kong Shen***Re: Public/Public**,*Kristian Gjøsteen***Re: Public/Public**,*Mike Amling***Re: Public/Public**,*Francois Grieu***Re: Public/Public**,*unruh***Re: Public/Public**,*Mike Amling*

**Security theatre?**,*Peter Fairbrother***Re: Security theatre?**,*bmearns***Re: Security theatre?**,*Peter Fairbrother***Re: Security theatre?**,*bmearns***Re: Security theatre?**,*Peter Fairbrother***Re: Security theatre?**,*J.D.***Re: Security theatre?**,*Pubkeybreaker***Re: Security theatre?**,*bmearns***Re: Security theatre?**,*Tom St Denis***Re: Security theatre?**,*Paul Rubin***Re: Security theatre?**,*Gordon Burditt***Re: Security theatre?**,*Alias***Re: Security theatre?**,*Maaartin***Re: Security theatre?**,*Stewart Malik***Re: Security theatre?**,*Stewart Malik***Re: Security theatre?**,*Maaartin*

**Re: Security theatre?**,*Peter Pearson***Re: Security theatre?**,*Peter Fairbrother***Re: Security theatre?**,*Peter Fairbrother*

**unique pemutation using 3DES**,*marvind434***Re: unique pemutation using 3DES**,*Mok-Kong Shen***Re: unique pemutation using 3DES**,*Maaartin***Re: unique pemutation using 3DES**,*J.D.***Re: unique pemutation using 3DES**,*Maaartin*

**entropy and the Yarrow PRNG for key generation**,*Michael***Bootstraps on Steroids**,*WTShaw***Re: Bootstraps on Steroids**,*Mok-Kong Shen***Re: Bootstraps on Steroids**,*WTShaw***Re: Bootstraps on Steroids**,*Mok-Kong Shen***Re: Bootstraps on Steroids**,*Earl_Colby_Pottinger***Re: Bootstraps on Steroids**,*WTShaw***Re: Bootstraps on Steroids**,*WTShaw**Message not available***Re: Bootstraps on Steroids**,*Mok-Kong Shen***Re: Bootstraps on Steroids**,*WTShaw***Re: Bootstraps on Steroids**,*Mok-Kong Shen***Re: Bootstraps on Steroids**,*WTShaw*

**Re: Bootstraps on Steroids**,*WTShaw*

**Are online password managers safe to use?**,*Ohm***Re: Are online password managers safe to use?**,*Dave -Turner**Message not available***Re: Are online password managers safe to use?**,*Ohm***Re: Are online password managers safe to use?**,*bmearns***Re: Are online password managers safe to use?**,*Anonymous***Re: Are online password managers safe to use?**,*Doc O'Leary***Re: Are online password managers safe to use?**,*bmearns***Re: Are online password managers safe to use?**,*unruh***Re: Are online password managers safe to use?**,*bmearns***Re: Are online password managers safe to use?**,*Maaartin***Re: Are online password managers safe to use?**,*bmearns*

**Shamir's Identity Based Encryption -- consensus**,*Argo***Re: Shamir's Identity Based Encryption -- consensus**,*Scott Fluhrer*

**Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.**,*adacrypt***Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.**,*Richard Outerbridge***Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.**,*Maaartin*

**Trying to explain A, B and C in Cryptology**,*Jesper Angelo***Re: Trying to explain A, B and C in Cryptology**,*amzoti***Re: Trying to explain A, B and C in Cryptology**,*David Eather*

**Asymmetric key length recommendations**,*Nomen Nescio***Re: Asymmetric key length recommendations**,*Jens Stuckelberger***Re: Asymmetric key length recommendations**,*Joseph Ashwood***Re: Asymmetric key length recommendations**,*Scott Contini***Re: Asymmetric key length recommendations**,*Scott Contini***Re: Asymmetric key length recommendations**,*Nomen Nescio***Re: Asymmetric key length recommendations**,*Scott Contini*

**Re: Asymmetric key length recommendations**,*Scott Contini***Re: Asymmetric key length recommendations**,*Non scrivetemi***Re: Asymmetric key length recommendations**,*Tom St Denis**Message not available***Re: Asymmetric key length recommendations**,*unruh*

**Australian Crypto Regulations**,*MK1024***Re: Australian Crypto Regulations**,*Dave -Turner***Re: Australian Crypto Regulations**,*amzoti***Re: Australian Crypto Regulations**,*unruh***Re: Australian Crypto Regulations**,*MK1024***Re: Australian Crypto Regulations**,*Maaartin*

**Re: Australian Crypto Regulations**,*starwars*

**Re: Australian Crypto Regulations**,*Mok-Kong Shen***Re: Australian Crypto Regulations**,*Tom St Denis***Re: Australian Crypto Regulations**,*unruh***Re: Australian Crypto Regulations**,*Pubkeybreaker***Re: Australian Crypto Regulations**,*Tom St Denis**Message not available***Re: Australian Crypto Regulations**,*Scott Contini***Re: Australian Crypto Regulations**,*Mok-Kong Shen*

**Re: The key to cracking any cipher: Elephant.**,*Quadibloc***why does PKCS#1 use the LCM instead of Euler's totient function?**,*yawnmoth***Practical applications still using DES**,*Brashen***Re: Practical applications still using DES**,*Paul Rubin***Re: Practical applications still using DES**,*Thomas ***in***Re: Practical applications still using DES**,*unruh***Re: Practical applications still using DES**,*Thomas ***in***Re: Practical applications still using DES**,*Paul Rubin*

**Re: Practical applications still using DES**,*Simon Johnson***Re: Practical applications still using DES**,*Paul Rubin***Re: Practical applications still using DES**,*Maaartin***Re: Practical applications still using DES**,*Scott Fluhrer*

**HTTP and HTTPS sessions question**,*balzer**Message not available**Message not available***Re: HTTP and HTTPS sessions question**,*Maaartin***Re: HTTP and HTTPS sessions question**,*balzer***Re: HTTP and HTTPS sessions question**,*mike clark*

**Re: HTTP and HTTPS sessions question**,*Paul Rubin***Re: HTTP and HTTPS sessions question**,*Maaartin***Re: HTTP and HTTPS sessions question**,*Paul Rubin*

**Associative hash function**,*Maaartin***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Maaartin***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Maaartin***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Scott Fluhrer***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Maaartin***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Maaartin***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Maaartin***Re: Associative hash function**,*Francois Grieu***Re: Associative hash function**,*Maaartin*

**Re: Associative hash function**,*Bryan***Re: Associative hash function**,*Maaartin***Re: Associative hash function**,*Kristian Gjøsteen***Re: Associative hash function**,*Francois Grieu*

**PGP question**,*Binary**Message not available**Message not available**Message not available***Re: PGP question**,*David Eather**Message not available***Re: PGP question**,*Bryan*

**Re: PGP question**,*Gordon Burditt*

**Re: Very basic questions**,*jmorton123***Re: Very basic questions**,*Richard Outerbridge***Re: Very basic questions**,*WTShaw*

**"new algo" ????**,*remy***Re: "new algo" ????**,*Pubkeybreaker***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*Pubkeybreaker***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*Pubkeybreaker***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*Noob*

**Re: "new algo" ????**,*remy***Re: "new algo" ????**,*remy***Re: "new algo" ????**,*remy*

**Antispam strategies**,*Mok-Kong Shen***Re: Antispam strategies**,*unruh***Re: Antispam strategies**,*Quadibloc***Re: Antispam strategies**,*Mok-Kong Shen***Re: Antispam strategies**,*Quadibloc***Re: Antispam strategies**,*unruh***Re: Antispam strategies**,*Mok-Kong Shen***Re: Antispam strategies**,*Quadibloc***Re: Antispam strategies**,*Mok-Kong Shen***Re: Antispam strategies**,*Gordon Burditt*

**Re: Antispam strategies**,*Tom St Denis***Re: Antispam strategies**,*Simon Johnson*

**Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*David Eather***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*WTShaw*

**Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*Mok-Kong Shen***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*Mok-Kong Shen***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*bmearns***Re: Permutations and calculated strength in bits**,*David Eather***Re: Permutations and calculated strength in bits**,*WTShaw***Re: Permutations and calculated strength in bits**,*David Eather***Re: Permutations and calculated strength in bits**,*WTShaw*

**A link on North Korean home-grwon OS**,*Mok-Kong Shen***Re: A link on North Korean home-grwon OS**,*Jan Panteltje*

**Re: Unlimited Key Length Random Binary Number Generator with Video Tutorial**,*jmorton123***Randomness: All you'll ever need to know**,*WTShaw***Re: Randomness: All you'll ever need to know**,*Richard Outerbridge***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*Richard Outerbridge***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*unruh***Re: Randomness: All you'll ever need to know**,*Scott Fluhrer***Re: Randomness: All you'll ever need to know**,*unruh***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*unruh***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*Phil Carmody***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*Scott Fluhrer***Re: Randomness: All you'll ever need to know**,*unruh***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*unruh***Re: Randomness: All you'll ever need to know**,*Mok-Kong Shen***Re: Randomness: All you'll ever need to know**,*Richard Outerbridge***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*Kristian Gjøsteen***Re: Randomness: All you'll ever need to know**,*Paul Rubin***Re: Randomness: All you'll ever need to know**,*Kristian Gjøsteen***Re: Randomness: All you'll ever need to know**,*Kristian Gjøsteen***Re: Randomness: All you'll ever need to know**,*WTShaw***Re: Randomness: All you'll ever need to know**,*WTShaw*

**Re: Randomness: All you'll ever need to know**,*WTShaw***Re: Randomness: All you'll ever need to know**,*Mok-Kong Shen*

**TrueCrypt broken**,*Matt Mahoney***Re: TrueCrypt broken**,*Xavier Roche***Re: TrueCrypt broken**,*Anne Onime*

*Message not available***Re: TrueCrypt broken**,*Maaartin***Re: TrueCrypt broken**,*nemo_outis*

**close encounters**,*dennyreno***What do you think of this Blowfish implementation?**,*Sal***Re: What do you think of this Blowfish implementation?**,*unruh***Re: What do you think of this Blowfish implementation?**,*Ivan Voras***Re: What do you think of this Blowfish implementation?**,*Paulo Marques***Re: What do you think of this Blowfish implementation?**,*rossum***Re: What do you think of this Blowfish implementation?**,*Ertugrul Söylemez*

**Gollin Lied, Babies Died**,*moe zarella***Computer Bunker**,*Globemaker***Re: Computer Bunker**,*Mok-Kong Shen***Re: Computer Bunker**,*Globemaker***Re: Computer Bunker**,*Earl_Colby_Pottinger***Re: Computer Bunker**,*Mok-Kong Shen***Re: Computer Bunker**,*jbriggs444***Re: Computer Bunker**,*Globemaker*

**Collecting true randomness/entropy from decimal part of the values calculated in stock exchange market**,*Phoenix***Collecting true randomness from natural language texts**,*Mok-Kong Shen***Re: Collecting true randomness from natural language texts**,*Earl_Colby_Pottinger***Re: Collecting true randomness from natural language texts**,*unruh***Re: Collecting true randomness from natural language texts**,*Earl_Colby_Pottinger***Re: Collecting true randomness from natural language texts**,*robertwessel2@xxxxxxxxx***Re: Collecting true randomness from natural language texts**,*unruh***Re: Collecting true randomness from natural language texts**,*robertwessel2@xxxxxxxxx***Re: Collecting true randomness from natural language texts**,*Mok-Kong Shen***Re: Collecting true randomness from natural language texts**,*unruh***Re: Collecting true randomness from natural language texts**,*robertwessel2@xxxxxxxxx***Re: Collecting true randomness from natural language texts**,*Mok-Kong Shen***Re: Collecting true randomness from natural language texts**,*David Eather***Re: Collecting true randomness from natural language texts**,*Maaartin***Re: Collecting true randomness from natural language texts**,*WTShaw***Re: Collecting true randomness from natural language texts**,*WTShaw*

**UIUC Professor’s Role in Liberian Shakedown Scheme**,*Rudolph deRednosedreindeer***What Are People Saying About U of Illinois Physics Prof George Gollin?**,*Rudolph deRednosedreindeer***Re: digital signature without hashing?**,*Kristian Gjøsteen***6th Int. Conf. on Technology and Medical Sciences – Announce & Call for Papers**,*tavares@xxxxxxxx***Where are the FIPS 140-1 tests for randomness now?**,*Mok-Kong Shen***Re: Where are the FIPS 140-1 tests for randomness now?**,*amzoti***Re: Where are the FIPS 140-1 tests for randomness now?**,*Mok-Kong Shen*

**Re: Where are the FIPS 140-1 tests for randomness now?**,*Scott Fluhrer***Re: Where are the FIPS 140-1 tests for randomness now?**,*Mok-Kong Shen***Re: Where are the FIPS 140-1 tests for randomness now?**,*Scott Fluhrer***Re: Where are the FIPS 140-1 tests for randomness now?**,*Mok-Kong Shen*

**George Gollin's Liberian Shakedown Role Revealed In Court Docs**,*moe zarella***Re: Hardware RNG**,*Mok-Kong Shen***Re: Permutation Extrapolation Function (PXF)**,*bmearns***Operator Protocols for using a PRF**,*WTShaw***Decoding string**,*Binary***Re: Decoding string**,*Tom St Denis***Re: Decoding string**,*Binary***Re: Decoding string**,*Globemaker*

**Re: Decoding string**,*WTShaw*

**Re: Decoding string**,*Globemaker***Re: Decoding string**,*rossum***Re: Decoding string**,*Maaartin*

**Re: Decoding string**,*Globemaker***Re: Decoding string**,*Binary*

**Re: Request to Use and Abuse My SHA512 Program**,*Thomas ***in***Re: Request to Use and Abuse My SHA512 Program**,*Tom St Denis*- <Possible follow-ups>
**Re: Request to Use and Abuse My SHA512 Program**,*David T. Ashley*

**Re: Binary code**,*WTShaw***Re: How much cyber security is really there?**,*Mok-Kong Shen***Re: How much cyber security is really there?**,*WTShaw***Re: How much cyber security is really there?**,*Mok-Kong Shen*

**Re: How much cyber security is really there?**,*unruh***Re: How much cyber security is really there?**,*Mok-Kong Shen***Re: How much cyber security is really there?**,*unruh***Re: How much cyber security is really there?**,*Mok-Kong Shen***Re: How much cyber security is really there?**,*unruh***Re: How much cyber security is really there?**,*WTShaw***Re: How much cyber security is really there?**,*unruh***Re: How much cyber security is really there?**,*spinner***Re: How much cyber security is really there?**,*WTShaw***Re: How much cyber security is really there?**,*WTShaw***Re: How much cyber security is really there?**,*WTShaw***Re: How much cyber security is really there?**,*WTShaw***Re: How much cyber security is really there?**,*unruh*

**Re: How much cyber security is really there?**,*WTShaw*

**Re: How much cyber security is really there?**,*bmearns*- <Possible follow-ups>
**Re: How much cyber security is really there?**,*WTShaw***Re: How much cyber security is really there?**,*WTShaw*

**Re: If we could factor large numbers quickly, how exactly does everything break?**,*Joseph Ashwood***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Pubkeybreaker***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Joseph Ashwood***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Pubkeybreaker***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Joseph Ashwood***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Pubkeybreaker***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Joseph Ashwood***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Pubkeybreaker***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Pubkeybreaker***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Joseph Ashwood***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Pubkeybreaker***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Phil Carmody***Re: If we could factor large numbers quickly, how exactly does everything break?**,*Scott Fluhrer*

**Re: Updating the Historic OTP.**,*Sebastian Garth***Re: Updating the Historic OTP.**,*J.D.***Re: Updating the Historic OTP.**,*WTShaw***Re: Updating the Historic OTP.**,*WTShaw***Re: Updating the Historic OTP.**,*Maaartin***Re: Updating the Historic OTP.**,*WTShaw*

- <Possible follow-ups>
**Re: Updating the Historic OTP.**,*Phil Carmody***Re: Updating the Historic OTP.**,*J.D.***Re: Updating the Historic OTP.**,*Pubkeybreaker*

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*David Eather***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*WTShaw***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*David Eather***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*WTShaw***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*Mok-Kong Shen***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*David Eather***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*WTShaw***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*David Eather***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*WTShaw***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*WTShaw***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*David Eather***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*David Eather***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*WTShaw***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*WTShaw***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*David Eather***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*WTShaw***Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)**,*Bryan*