# sci.crypt

**Re: Mark-Up Cryptography or Encapsulation Cryptography.***From*: Mok-Kong Shen

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Mark-Up Cryptography or Encapsulation Cryptography.***From*: adacrypt

**Re: Mark-Up Cryptography or Encapsulation Cryptography.***From*: adacrypt

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Chambal et al***From*: Mok-Kong Shen

**Re: Mark-Up Cryptography or Encapsulation Cryptography.***From*: Mok-Kong Shen

**Re: Security theatre?***From*: Pubkeybreaker

**Re: Mark-Up Cryptography or Encapsulation Cryptography.***From*: adacrypt

**Re: Security theatre?***From*: Tom St Denis

**Re: Dynamic Hill cipher***From*: Tom St Denis

**Re: Mark-Up Cryptography or Encapsulation Cryptography.***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Mark-Up Cryptography or Encapsulation Cryptography.***From*: adacrypt

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Dynamic Hill cipher***From*: Maaartin

**Re: Dynamic Hill cipher***From*: Bryan

**Re: Security theatre?***From*: Paul Rubin

**Re: Dynamic Hill cipher***From*: Bryan

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Scott Fluhrer

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Dynamic Hill cipher***From*: Scott Fluhrer

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Dynamic Hill cipher***From*: Maaartin

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Dynamic Hill cipher***From*: Scott Fluhrer

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Dynamic Hill cipher***From*: Maaartin

**CFP Applied Computing 2010: submissions until 28 May 2010***From*: natty2006@xxxxxxxxx

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Chambal et al***From*: WTShaw

**Re: Call for review: Hashing by hand algorithm***From*: WTShaw

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: MrD

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Dynamic Hill cipher***From*: Bryan

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Public Key Size in ECDSA***From*: Tom St Denis

**Re: Antispam strategies***From*: Simon Johnson

**Public Key Size in ECDSA***From*: Eddie

**Re: Antispam strategies***From*: Gordon Burditt

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Antispam strategies***From*: Mok-Kong Shen

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: bad client public DH value***From*: Peter Pearson

**Re: Antispam strategies***From*: Quadibloc

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Antispam strategies***From*: Mok-Kong Shen

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Antispam strategies***From*: Tom St Denis

**Scripting Ciphers.***From*: adacrypt

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Bryan

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Antispam strategies***From*: unruh

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Antispam strategies***From*: Quadibloc

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Steganography Software***From*: Mok-Kong Shen

**Re: Dynamic Hill cipher***From*: Maaartin

**Re: Steganography Software***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: bad client public DH value***From*: Ertugrul Söylemez

**Re: Antispam strategies***From*: Mok-Kong Shen

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**bad client public DH value***From*: yawnmoth

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Public/Public***From*: Mike Amling

**Re: Dynamic Hill cipher***From*: Mok-Kong Shen

**Re: Steganography Software***From*: Mok-Kong Shen

**Re: Call for review: Hashing by hand algorithm***From*: J.D.

**Re: Dynamic Hill cipher***From*: Bryan

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: Steganography Software***From*: bmearns

**Re: Security theatre?***From*: Maaartin

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Security theatre?***From*: Stewart Malik

**Re: Security theatre?***From*: Stewart Malik

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Call for review: Hashing by hand algorithm***From*: bmearns

**Re: Security theatre?***From*: Maaartin

**Re: Security theatre?***From*: Alias

**Re: Steganography Software***From*: Maaartin

**Re: Steganography Software***From*: Mok-Kong Shen

**Re: Steganography Software***From*: Maaartin

**Re: Steganography Software***From*: Mok-Kong Shen

**Re: Steganography Software***From*: Gordon Burditt

**Re: Call for review: Hashing by hand algorithm***From*: WTShaw

**Re: Call for review: Hashing by hand algorithm***From*: WTShaw

**Re: Bootstraps on Steroids***From*: WTShaw

**Steganography Software***From*: jmorton123

**Re: Public/Public***From*: unruh

**Re: Call for review: Hashing by hand algorithm***From*: Maaartin

**Re: An application of indirectness and variability***From*: Maaartin

**Re: Public/Public***From*: Francois Grieu

**Re: Bootstraps on Steroids***From*: Mok-Kong Shen

**Re: An application of indirectness and variability***From*: Mok-Kong Shen

**Re: Bootstraps on Steroids***From*: WTShaw

**Re: An application of indirectness and variability***From*: WTShaw

**An application of indirectness and variability***From*: Mok-Kong Shen

**Re: PE Scrambler***From*: Mok-Kong Shen

**Re: PE Scrambler***From*: Ertugrul Söylemez

**Re: PE Scrambler***From*: balzer

**Re: PE Scrambler***From*: Mok-Kong Shen

**Re: PE Scrambler***From*: balzer

**Re: Public/Public***From*: Mike Amling

**Re: Bootstraps on Steroids***From*: Mok-Kong Shen

**Re: Bootstraps on Steroids***From*: WTShaw

**Re: Bootstraps on Steroids***From*: WTShaw

**Re: PE Scrambler***From*: Mok-Kong Shen

**Re: Public/Public***From*: Kristian Gjøsteen

**Re: Security theatre?***From*: Gordon Burditt

**Re: PE Scrambler***From*: unruh

**PE Scrambler***From*: balzer

**Re: Public/Public***From*: Mok-Kong Shen

**Re: Security theatre?***From*: bmearns

**Re: Security theatre?***From*: J.D.

**Re: Security theatre?***From*: Peter Fairbrother

**Re: Security theatre?***From*: Peter Fairbrother

**Re: Security theatre?***From*: Peter Fairbrother

**Re: Security theatre?***From*: Peter Pearson

**Dynamic Hill cipher***From*: Mok-Kong Shen

**Public/Public***From*: Peter Fairbrother

**Re: Security theatre?***From*: bmearns

**Re: Security theatre?***From*: Peter Fairbrother

**Re: Security theatre?***From*: bmearns

**Security theatre?***From*: Peter Fairbrother

**Re: unique pemutation using 3DES***From*: J.D.

**Re: Are online password managers safe to use?***From*: bmearns

**Re: unique pemutation using 3DES***From*: Maaartin

**Re: Are online password managers safe to use?***From*: Maaartin

**Re: Are online password managers safe to use?***From*: bmearns

**Re: Australian Crypto Regulations***From*: Tom St Denis

**Re: Bootstraps on Steroids***From*: Earl_Colby_Pottinger

**Re: Bootstraps on Steroids***From*: Mok-Kong Shen

**Re: Australian Crypto Regulations***From*: Mok-Kong Shen

**Re: Bootstraps on Steroids***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: unique pemutation using 3DES***From*: J.D.

**Re: unique pemutation using 3DES***From*: Maaartin

**Re: entropy and the Yarrow PRNG for key generation***From*: unruh

**Re: unique pemutation using 3DES***From*: Mok-Kong Shen

**unique pemutation using 3DES***From*: marvind434

**Re: entropy and the Yarrow PRNG for key generation***From*: Peter Pearson

**entropy and the Yarrow PRNG for key generation***From*: Michael

**Re: Are online password managers safe to use?***From*: unruh

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: Are online password managers safe to use?***From*: bmearns

**Re: Are online password managers safe to use?***From*: Doc O'Leary

**Re: Bootstraps on Steroids***From*: WTShaw

**Re: Bootstraps on Steroids***From*: Mok-Kong Shen

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Are online password managers safe to use?***From*: Anonymous

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: Phil Carmody

**Re: Are online password managers safe to use?***From*: bmearns

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: Permutations and calculated strength in bits***From*: bmearns

**Bootstraps on Steroids***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Are online password managers safe to use?***From*: Ohm

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: Bruce Stephens

**Re: Are online password managers safe to use?***From*: Dave -Turner

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: rossum

**Re: Shamir's Identity Based Encryption -- consensus***From*: Scott Fluhrer

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: adacrypt

**Re: Permutations and calculated strength in bits***From*: bmearns

**Are online password managers safe to use?***From*: Ohm

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: adacrypt

**Shamir's Identity Based Encryption -- consensus***From*: Argo

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: adacrypt

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: Bryan

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: adacrypt

**Re: Trying to explain A, B and C in Cryptology***From*: David Eather

**Re: Australian Crypto Regulations***From*: Scott Contini

**Re: Asymmetric key length recommendations***From*: Scott Contini

**Re: Asymmetric key length recommendations***From*: Bryan

**Re: Asymmetric key length recommendations***From*: Nomen Nescio

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: Maaartin

**Re: Trying to explain A, B and C in Cryptology***From*: amzoti

**Re: Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: Richard Outerbridge

**Re: Australian Crypto Regulations***From*: Pubkeybreaker

**Re: Asymmetric key length recommendations***From*: unruh

**Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.***From*: adacrypt

**Re: Australian Crypto Regulations***From*: unruh

**Re: Asymmetric key length recommendations***From*: Tom St Denis

**Re: Asymmetric key length recommendations***From*: Non scrivetemi

**Re: Australian Crypto Regulations***From*: Tom St Denis

**Re: Australian Crypto Regulations***From*: Mok-Kong Shen

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: WTShaw

**Trying to explain A, B and C in Cryptology***From*: Jesper Angelo

**Re: Asymmetric key length recommendations***From*: Scott Contini

**Re: Asymmetric key length recommendations***From*: Scott Contini

**Re: Asymmetric key length recommendations***From*: Scott Contini

**Re: Asymmetric key length recommendations***From*: Joseph Ashwood

**Re: Asymmetric key length recommendations***From*: Jens Stuckelberger

**Asymmetric key length recommendations***From*: Nomen Nescio

**Re: Australian Crypto Regulations***From*: starwars

**Re: Australian Crypto Regulations***From*: Maaartin

**Re: Australian Crypto Regulations***From*: MK1024

**Re: Associative hash function***From*: Maaartin

**Re: Associative hash function***From*: Francois Grieu

**Re: Australian Crypto Regulations***From*: unruh

**Re: Associative hash function***From*: Maaartin

**Re: Associative hash function***From*: Francois Grieu

**Re: Australian Crypto Regulations***From*: amzoti

**Re: Associative hash function***From*: Maaartin

**Re: Associative hash function***From*: Francois Grieu

**Re: Associative hash function***From*: Francois Grieu

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Antispam strategies***From*: Quadibloc

**Re: Australian Crypto Regulations***From*: Dave -Turner

**Australian Crypto Regulations***From*: MK1024

**Re: Associative hash function***From*: Maaartin

**Re: Associative hash function***From*: Francois Grieu

**Re: Practical applications still using DES***From*: Scott Fluhrer

**Re: Practical applications still using DES***From*: Maaartin

**Re: Practical applications still using DES***From*: Paul Rubin

**Re: Practical applications still using DES***From*: Simon Johnson

**Re: The key to cracking any cipher: Elephant.***From*: Quadibloc

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: Practical applications still using DES***From*: Thomas ***in

**Re: Associative hash function***From*: Francois Grieu

**Re: Associative hash function***From*: Kristian Gjøsteen

**Re: Randomness: All you'll ever need to know***From*: Kristian Gjøsteen

**Re: Randomness: All you'll ever need to know***From*: Kristian Gjøsteen

**Re: Randomness: All you'll ever need to know***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: Mok-Kong Shen

**Re: HTTP and HTTPS sessions question***From*: Paul Rubin

**Re: Practical applications still using DES***From*: Paul Rubin

**Re: Practical applications still using DES***From*: unruh

**Re: Associative hash function***From*: Maaartin

**Re: HTTP and HTTPS sessions question***From*: Maaartin

**Re: Associative hash function***From*: Bryan

**Re: Practical applications still using DES***From*: Thomas ***in

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Permutations and calculated strength in bits***From*: David Eather

**Re: Practical applications still using DES***From*: Paul Rubin

**Re: Associative hash function***From*: Francois Grieu

**Re: Associative hash function***From*: Scott Fluhrer

**Re: HTTP and HTTPS sessions question***From*: Paul Rubin

**Re: Associative hash function***From*: Francois Grieu

**Re: HTTP and HTTPS sessions question***From*: mike clark

**Re: HTTP and HTTPS sessions question***From*: balzer

**Re: HTTP and HTTPS sessions question***From*: Maaartin

**Re: why does PKCS#1 use the LCM instead of Euler's totient function?***From*: Tom St Denis

**Re: why does PKCS#1 use the LCM instead of Euler's totient function?***From*: Francois Grieu

**Re: why does PKCS#1 use the LCM instead of Euler's totient function?***From*: Pubkeybreaker

**why does PKCS#1 use the LCM instead of Euler's totient function?***From*: yawnmoth

**Re: Associative hash function***From*: Maaartin

**Re: Associative hash function***From*: Francois Grieu

**Re: Randomness: All you'll ever need to know***From*: Kristian Gjøsteen

**Practical applications still using DES***From*: Brashen

**Re: Associative hash function***From*: Maaartin

**Re: Associative hash function***From*: Francois Grieu

**HTTP and HTTPS sessions question***From*: balzer

**Associative hash function***From*: Maaartin

**Re: "new algo" ????***From*: remy

**Re: Randomness: All you'll ever need to know***From*: WTShaw

**Re: Very basic questions***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: TrueCrypt broken***From*: nemo_outis

**Re: PGP question***From*: Gordon Burditt

**Re: TrueCrypt broken***From*: Maaartin

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: David Eather

**Re: Permutations and calculated strength in bits***From*: David Eather

**Re: PGP question***From*: Bryan

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: remy

**Re: Permutations and calculated strength in bits***From*: Mok-Kong Shen

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: WTShaw

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Permutations and calculated strength in bits***From*: WTShaw

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: PGP question***From*: David Eather

**PGP question***From*: Binary

**Re: Randomness: All you'll ever need to know***From*: unruh

**Re: Unlimited Key Length Random Binary Number Generator with Video Tutorial***From*: jmorton123

**Re: Very basic questions***From*: Richard Outerbridge

**Re: Randomness: All you'll ever need to know***From*: Scott Fluhrer

**Re: Very basic questions***From*: jmorton123

**Re: Randomness: All you'll ever need to know***From*: Richard Outerbridge

**Re: Computer Bunker***From*: Globemaker

**Re: Computer Bunker***From*: jbriggs444

**Re: Permutations and calculated strength in bits***From*: bmearns

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: Noob

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: Pubkeybreaker

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: Pubkeybreaker

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: remy

**Re: "new algo" ????***From*: Pubkeybreaker

**"new algo" ????***From*: remy

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Randomness: All you'll ever need to know***From*: Phil Carmody

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Randomness: All you'll ever need to know***From*: unruh

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Randomness: All you'll ever need to know***From*: unruh

**Re: Randomness: All you'll ever need to know***From*: unruh

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Randomness: All you'll ever need to know***From*: Scott Fluhrer

**Re: Antispam strategies***From*: unruh

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Phil Carmody

**Antispam strategies***From*: Mok-Kong Shen

**Re: Randomness: All you'll ever need to know***From*: Mok-Kong Shen

**Re: Randomness: All you'll ever need to know***From*: Mok-Kong Shen

**Re: Randomness: All you'll ever need to know***From*: unruh

**Re: Permutations and calculated strength in bits***From*: David Eather

**Re: Unlimited Key Length Random Binary Number Generator with Video Tutorial***From*: WTShaw

**Permutations and calculated strength in bits***From*: WTShaw

**Re: Randomness: All you'll ever need to know***From*: WTShaw

**Re: Randomness: All you'll ever need to know***From*: WTShaw

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Randomness: All you'll ever need to know***From*: Richard Outerbridge

**Re: Randomness: All you'll ever need to know***From*: Paul Rubin

**Re: Randomness: All you'll ever need to know***From*: Richard Outerbridge

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Pubkeybreaker

**Re: A link on North Korean home-grwon OS***From*: Jan Panteltje

**A link on North Korean home-grwon OS***From*: Mok-Kong Shen

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Joseph Ashwood

**Re: Unlimited Key Length Random Binary Number Generator with Video Tutorial***From*: jmorton123

**Randomness: All you'll ever need to know***From*: WTShaw

**Re: TrueCrypt broken***From*: Anne Onime

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Pubkeybreaker

**Re: TrueCrypt broken***From*: Xavier Roche

**TrueCrypt broken***From*: Matt Mahoney

**close encounters***From*: dennyreno

**Re: What do you think of this Blowfish implementation?***From*: Ertugrul Söylemez

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: David Eather

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: David Eather

**Re: Operator Protocols for using a PRF***From*: bmearns

**Re: What do you think of this Blowfish implementation?***From*: rossum

**Re: What do you think of this Blowfish implementation?***From*: Paulo Marques

**Re: Operator Protocols for using a PRF***From*: WTShaw

**Re: Computer Bunker***From*: Mok-Kong Shen

**Re: Decoding string***From*: Binary

**Re: What do you think of this Blowfish implementation?***From*: Ivan Voras

**Re: What do you think of this Blowfish implementation?***From*: unruh

**Re: What do you think of this Blowfish implementation?***From*: Sal

**Re: What do you think of this Blowfish implementation?***From*: unruh

**What do you think of this Blowfish implementation?***From*: Sal

**Re: Computer Bunker***From*: Earl_Colby_Pottinger

**Re: Operator Protocols for using a PRF***From*: bmearns

**Re: Computer Bunker***From*: Globemaker

**Re: Operator Protocols for using a PRF***From*: WTShaw

**Re: How much cyber security is really there?***From*: WTShaw

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: WTShaw

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: WTShaw

**Re: Operator Protocols for using a PRF***From*: WTShaw

**Re: Collecting true randomness from natural language texts***From*: WTShaw

**Re: Collecting true randomness from natural language texts***From*: WTShaw

**Re: Computer Bunker***From*: Mok-Kong Shen

**Re: Collecting true randomness from natural language texts***From*: Mok-Kong Shen

**Gollin Lied, Babies Died***From*: moe zarella

**Re: Collecting true randomness from natural language texts***From*: robertwessel2@xxxxxxxxx

**Re: Request to Use and Abuse My SHA512 Program***From*: David T. Ashley

**Computer Bunker***From*: Globemaker

**Re: Collecting true randomness from natural language texts***From*: unruh

**Re: Collecting true randomness from natural language texts***From*: Mok-Kong Shen

**Re: Operator Protocols for using a PRF***From*: bmearns

**Re: Operator Protocols for using a PRF***From*: Noob

**Re: Collecting true randomness/entropy from decimal part of the values calculated in stock exchange market***From*: ttw6687@xxxxxxx

**Re: Operator Protocols for using a PRF***From*: bmearns

**Re: Collecting true randomness from natural language texts***From*: Maaartin

**Collecting true randomness/entropy from decimal part of the values calculated in stock exchange market***From*: Phoenix

**Re: Collecting true randomness from natural language texts***From*: David Eather

**Re: Collecting true randomness from natural language texts***From*: robertwessel2@xxxxxxxxx

**Re: Collecting true randomness from natural language texts***From*: unruh

**Re: Collecting true randomness from natural language texts***From*: robertwessel2@xxxxxxxxx

**Re: Collecting true randomness from natural language texts***From*: Earl_Colby_Pottinger

**Re: Collecting true randomness from natural language texts***From*: unruh

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Pubkeybreaker

**Re: Collecting true randomness from natural language texts***From*: Earl_Colby_Pottinger

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Scott Fluhrer

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Joseph Ashwood

**Re: Where are the FIPS 140-1 tests for randomness now?***From*: Mok-Kong Shen

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Pubkeybreaker

**Re: Where are the FIPS 140-1 tests for randomness now?***From*: Scott Fluhrer

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: David Eather

**Collecting true randomness from natural language texts***From*: Mok-Kong Shen

**UIUC Professor’s Role in Liberian Shakedown Scheme***From*: Rudolph deRednosedreindeer

**Re: How much cyber security is really there?***From*: WTShaw

**Re: How much cyber security is really there?***From*: WTShaw

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: WTShaw

**Re: What Are People Saying About U of Illinois Physics Prof George Gollin?***From*: WTShaw

**What Are People Saying About U of Illinois Physics Prof George Gollin?***From*: Rudolph deRednosedreindeer

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: David Eather

**Re: How much cyber security is really there?***From*: spinner

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: Mok-Kong Shen

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Joseph Ashwood

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: WTShaw

**Re: Where are the FIPS 140-1 tests for randomness now?***From*: Mok-Kong Shen

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: David Eather

**Re: Where are the FIPS 140-1 tests for randomness now?***From*: Scott Fluhrer

**Re: How much cyber security is really there?***From*: unruh

**Re: How much cyber security is really there?***From*: unruh

**Re: Where are the FIPS 140-1 tests for randomness now?***From*: Mok-Kong Shen

**Re: digital signature without hashing?***From*: Kristian Gjøsteen

**Re: Where are the FIPS 140-1 tests for randomness now?***From*: amzoti

**6th Int. Conf. on Technology and Medical Sciences – Announce & Call for Papers***From*: tavares@xxxxxxxx

**Re: Permutation Extrapolation Function (PXF)***From*: WTShaw

**Re: How much cyber security is really there?***From*: WTShaw

**Re: How much cyber security is really there?***From*: WTShaw

**Re: How much cyber security is really there?***From*: WTShaw

**Where are the FIPS 140-1 tests for randomness now?***From*: Mok-Kong Shen

**Re: Decoding string***From*: Maaartin

**George Gollin's Liberian Shakedown Role Revealed In Court Docs***From*: moe zarella

**Re: Decoding string***From*: Globemaker

**Re: Hardware RNG***From*: Mok-Kong Shen

**Re: Decoding string***From*: rossum

**Re: Updating the Historic OTP.***From*: Pubkeybreaker

**Re: Updating the Historic OTP.***From*: J.D.

**Re: Updating the Historic OTP.***From*: Phil Carmody

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Pubkeybreaker

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Joseph Ashwood

**Re: How much cyber security is really there?***From*: bmearns

**Re: Permutation Extrapolation Function (PXF)***From*: bmearns

**Operator Protocols for using a PRF***From*: WTShaw

**Re: Updating the Historic OTP.***From*: WTShaw

**Re: Decoding string***From*: WTShaw

**Re: How much cyber security is really there?***From*: unruh

**Re: How much cyber security is really there?***From*: Mok-Kong Shen

**Re: How much cyber security is really there?***From*: unruh

**Re: Decoding string***From*: Globemaker

**Re: Decoding string***From*: Binary

**Re: Decoding string***From*: Globemaker

**Re: Decoding string***From*: Tom St Denis

**Re: How much cyber security is really there?***From*: Mok-Kong Shen

**Decoding string***From*: Binary

**Re: How much cyber security is really there?***From*: unruh

**Re: How much cyber security is really there?***From*: Mok-Kong Shen

**Re: Request to Use and Abuse My SHA512 Program***From*: Tom St Denis

**Re: Request to Use and Abuse My SHA512 Program***From*: Thomas ***in

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Pubkeybreaker

**Re: Updating the Historic OTP.***From*: Maaartin

**Re: How much cyber security is really there?***From*: WTShaw

**Re: How much cyber security is really there?***From*: WTShaw

**Re: How much cyber security is really there?***From*: WTShaw

**Re: Binary code***From*: WTShaw

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: WTShaw

**Re: Updating the Historic OTP.***From*: WTShaw

**Re: Updating the Historic OTP.***From*: WTShaw

**Re: How much cyber security is really there?***From*: Mok-Kong Shen

**Re: If we could factor large numbers quickly, how exactly does everything break?***From*: Joseph Ashwood

**Re: Updating the Historic OTP.***From*: J.D.

**Re: Updating the Historic OTP.***From*: Sebastian Garth

**Re: Permutation Extrapolation Function (PXF) (you might find the end of the post useful)***From*: David Eather