[15480] in cryptography@c2.net mail archive
Re: Examining the Encryption Threat
daemon@ATHENA.MIT.EDU (Peter Gutmann)
Fri May 28 09:47:36 2004
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: cryptography@metzdowd.com, peterparker@fastmail.fm
In-Reply-To: <1085722893.4665.197332785@webmail.messagingengine.com>
Date: Sat, 29 May 2004 01:20:30 +1200
"Peter Parker" <peterparker@fastmail.fm> writes:
>In one of the issue of ijde found at
>http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have analysed
>various encryption applications and discussed results for few sample
>applications. Does any one have the complete results. Tried mailing the
>author but no response. Any one having further info.
To save people downloading the PDF, it's an 11-page article that reinvents
the 'file' command.
Peter.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com