25 Nov 08:56 2014Parkinson, Sean
*Elliptic curve evaluation truths
25 Nov 17:34 2014Watson Ladd
**Elliptic curve evaluation truths
26 Nov 01:02 2014Parkinson, Sean
***Elliptic curve evaluation truths
26 Nov 02:59 2014Parkinson, Sean
****Elliptic curve evaluation truths
26 Nov 03:02 2014Michael Hamburg
****Elliptic curve evaluation truths
26 Nov 10:39 2014Paterson, Kenny
*****Elliptic curve evaluation truths
23 Nov 14:54 2014Alexey Melnikov
*Fwd: [irsg] IRSG review request: CFRG document draft-irtf-cfrg-chacha2
20 Nov 22:00 2014Yaron Sheffer
*Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 18:48 2014Yaron Sheffer
*Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 19:09 2014Watson Ladd
**Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 19:17 2014Harry Halpin
***Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 19:20 2014Yaron Sheffer
***Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 19:30 2014Harry Halpin
**Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 16:38 2014Harry Halpin
*Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 16:59 2014Salz, Rich
**Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 17:00 2014Watson Ladd
**Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 17:24 2014Jonathan Berliner
***Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 17:58 2014Scott Fluhrer (sfluhrer
****Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 18:27 2014Manuel Pégourié-Gonnard
*****Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 18:50 2014David Gil
******Proposed Informational Note: Security Guidelines for Cryptographic Alg
21 Nov 08:55 2014Manuel Pégourié-Gonnard
*******Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 17:57 2014Paul Hoffman
**Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 19:23 2014Harry Halpin
***Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 21:11 2014Dan Brown
****Proposed Informational Note: Security Guidelines for Cryptographic Alg
20 Nov 22:09 2014Dan Harkins
**Proposed Informational Note: Security Guidelines for Cryptographic Alg
19 Nov 17:06 2014RONDEPIERRE Franck
*Requirements for elliptic curves with a view towards constrained devic
19 Nov 19:20 2014Dan Brown
**Requirements for elliptic curves with a view towards constrained devic
20 Nov 05:33 2014Watson Ladd
**Requirements for elliptic curves with a view towards constrained devic
20 Nov 09:01 2014Lochter, Manfred
***Requirements for elliptic curves with a view towards constrained devic
20 Nov 16:21 2014Watson Ladd
****Requirements for elliptic curves with a view towards constrained devic
21 Nov 13:51 2014Lochter, Manfred
*****Requirements for elliptic curves with a view towards constrained devic
21 Nov 14:43 2014Alyssa Rowan
******Requirements for elliptic curves with a view towards constrained devic
21 Nov 17:58 2014Watson Ladd
******Requirements for elliptic curves with a view towards constrained devic
21 Nov 18:26 2014Andy Lutomirski
*******Requirements for elliptic curves with a view towards constrained devic
22 Nov 07:00 2014Watson Ladd
********Requirements for elliptic curves with a view towards constrained devic
22 Nov 13:13 2014William Whyte
*******Requirements for elliptic curves with a view towards constrained devic
20 Nov 09:56 2014Manuel Pégourié-Gonnard
**Requirements for elliptic curves with a view towards constrained devic
20 Nov 10:29 2014Lochter, Manfred
***Requirements for elliptic curves with a view towards constrained devic
22 Nov 00:12 2014D. J. Bernstein
**Handling invalid points
22 Nov 01:57 2014Michael Hamburg
***Handling invalid points
22 Nov 03:34 2014Michael Hamburg
****Handling invalid points
22 Nov 09:00 2014Natanael
****Handling invalid points
25 Nov 14:08 2014D. J. Bernstein
****Handling invalid points
25 Nov 16:01 2014Adam Langley
*****Handling invalid points
22 Nov 13:51 2014Ilari Liusvaara
***Handling invalid points
22 Nov 14:50 2014Stephen Farrell
****Handling invalid points
23 Nov 01:52 2014D. J. Bernstein
**Requirements for elliptic curves with a view towards constrained devic
17 Nov 16:56 2014Stephen Farrell
*IBE checking...
17 Nov 22:45 2014Jim Schaad
**IBE checking...
18 Nov 06:32 2014Watson Ladd
**IBE checking...
12 Nov 00:13 2014internet-drafts
*I-D Action: draft-irtf-cfrg-dragonfly-05.txt
10 Nov 08:06 2014internet-drafts
*I-D Action: draft-irtf-cfrg-chacha20-poly1305-03.txt
8 Nov 01:40 2014Todd Blose
*Mailman version
8 Nov 01:41 2014Todd Blose
**Mailman version
7 Nov 20:37 2014Paul Hoffman
*A nudge on revising RFC 6090
7 Nov 06:37 2014Watson Ladd
*GPG and the way forward
7 Nov 22:43 2014Andrey Jivsov
**GPG and the way forward
7 Nov 22:57 2014Daniel Kahn Gillmor
***GPG and the way forward
10 Nov 08:57 2014Werner Koch
****GPG and the way forward
7 Nov 18:54 2014Derek Atkins
**GPG and the way forward
9 Nov 03:46 2014Watson Ladd
***GPG and the way forward
3 Nov 19:14 2014Dan Brown
*new curves or old (was: Actual security levels for IETF crypto)
31 Oct 02:12 2014Paulo Sergio Licciardi Messede
*Signature question ... [RE: Actual security levels for IETF crypto]
31 Oct 05:33 2014Mike Hamburg
**Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 21:17 2014Paulo Sergio Licciardi Messede
*Signature question ... [RE: Actual security levels for IETF crypto]
31 Oct 01:16 2014Michael Hamburg
**Signature question ... [RE: Actual security levels for IETF crypto]
29 Oct 16:24 2014Dan Brown
*Terms for comparing curves and other algorithms, on the basis of secur
29 Oct 18:53 2014Mike Hamburg
**Terms for comparing curves and other algorithms, on the basis of secur
30 Oct 22:12 2014Dan Brown
***Terms for comparing curves and other algorithms, on the basis of secur
29 Oct 15:25 2014Dan Brown
*Signature question ... [RE: Actual security levels for IETF crypto]
29 Oct 18:49 2014David Leon Gil
**Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 15:54 2014Watson Ladd
***Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 16:27 2014Ilari Liusvaara
****Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 16:33 2014Blumenthal, Uri - 0558 - MITLL
*****Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 16:47 2014Ilari Liusvaara
******Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 16:57 2014Yoav Nir
*******Signature question ... [RE: Actual security levels for IETF crypto]
2 Nov 14:12 2014Manuel Pégourié-Gonnard
********Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 17:02 2014Watson Ladd
*******Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 17:33 2014Blumenthal, Uri - 0558 - MITLL
********Signature question ... [RE: Actual security levels for IETF crypto]
30 Oct 18:55 2014David Leon Gil
****Signature question ... [RE: Actual security levels for IETF crypto]
28 Oct 16:26 2014David Leon Gil
*Estimating the adversary's computational power (was Re: [CFRG] Actual
28 Oct 17:45 2014Yoav Nir
**Estimating the adversary's computational power (was Re: [CFRG] Actual
28 Oct 16:24 2014Watson Ladd
*Requirements, part II
28 Oct 17:37 2014Andy Lutomirski
**Requirements, part II
27 Oct 06:34 2014D. J. Bernstein
*Actual security levels for IETF crypto
27 Oct 14:27 2014Stephen Farrell
**Actual security levels for IETF crypto
27 Oct 16:35 2014Watson Ladd
***Actual security levels for IETF crypto
27 Oct 17:03 2014Yoav Nir
****Actual security levels for IETF crypto
29 Oct 20:47 2014D. J. Bernstein
*****Actual security levels for IETF crypto
29 Oct 21:46 2014Benjamin Black
******Actual security levels for IETF crypto
29 Oct 22:29 2014Bodo Moeller
******Actual security levels for IETF crypto
30 Oct 22:06 2014Randy Bush
******Actual security levels for IETF crypto
30 Oct 22:23 2014Benjamin Black
*******Actual security levels for IETF crypto
31 Oct 08:20 2014Richard Barnes
********Actual security levels for IETF crypto
31 Oct 08:51 2014Randy Bush
*********Actual security levels for IETF crypto
31 Oct 09:05 2014Alyssa Rowan
**********Actual security levels for IETF crypto
31 Oct 10:23 2014Randy Bush
***********Actual security levels for IETF crypto
31 Oct 11:27 2014Yoav Nir
************Actual security levels for IETF crypto
31 Oct 14:19 2014Phillip Hallam-Baker
************Actual security levels for IETF crypto
31 Oct 11:18 2014Yoav Nir
***********Actual security levels for IETF crypto