Fwd: Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSourceFwd: Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource
Duke Abbaddon
2023-02-22
quic
None
/arch/msg/quic/rFXhoiWxw2QvOLFYKhy1epmL_-Y/
3278748
2052409
[Pqc] Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource[Pqc] Post Quantum & Previous Network optimisation & security for the next age : More Info https://is.gd/LEDSource
Duke Abbaddon
2023-02-22
pqc
None
/arch/msg/pqc/A7nAAz6RbhAhKcxB7moWVQc1VCQ/
3278747
2052408
[Pqc] You know you talk about S-Matrix in https://home.web.cern.ch/events/bridging-positivity-and-s-matrix-bootstrap-bounds[Pqc] You know you talk about S-Matrix in https://home.web.cern.ch/events/bridging-positivity-and-s-matrix-bootstrap-bounds
Duke Abbaddon
2023-02-22
pqc
None
/arch/msg/pqc/dk-IC39Ey8OczrpKj9d4QbK1Bzw/
3278714
2052394
[Pqc] Dual Stack Single Load OpenCL for Certificate level TSL Computation & Service (c)RS[Pqc] Dual Stack Single Load OpenCL for Certificate level TSL Computation & Service (c)RS
Duke Abbaddon
2023-02-09
pqc
None
/arch/msg/pqc/CsdKQ9T93WcnGnQ66lTQlr5avvo/
3274186
2050675
Re: [TLS] TLS Digest, Vol 223, Issue 7Re: [TLS] TLS Digest, Vol 223, Issue 7
Duke Abbaddon
2023-02-09
tls
None
/arch/msg/tls/IxEjNAboIQ2qxmmTkEJt2H7UZ1w/
3274182
2050674
Re: [TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?Re: [TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?
Achim Kraus
2023-02-06
tls
None
/arch/msg/tls/f2Vtfry1Vg9zz0WCsPFTYK2hOiY/
3273015
2050160
[TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?[TLS] I know TLS Device & Radio & BT protocol, For such things as mice & keyboards & Game-Pads, Could propose AES & PSK, Can you see ECDHE Being used ? maybe Preshare & seeded PSK is better, Can we make a protocol TLS for devices ?
Duke Abbaddon
2023-02-06
tls
None
/arch/msg/tls/QBPcA3b5yACurxidVbr2AF0RRdo/
3272992
2050160
[Pqc] Ref: TLS 1.2 & TLS 1.3 Certificates : PQC : I believe that PKI Could be reasoned to understand Alternate Encryption types, Because Certificate size is not limited, Rather bracketed around the 384, 512, 2048, 4192 Bit Sizes[Pqc] Ref: TLS 1.2 & TLS 1.3 Certificates : PQC : I believe that PKI Could be reasoned to understand Alternate Encryption types, Because Certificate size is not limited, Rather bracketed around the 384, 512, 2048, 4192 Bit Sizes
Duke Abbaddon
2023-02-05
pqc
None
/arch/msg/pqc/VqUnKVCpNKZ1AevvZUl_D3Y7EAE/
3272966
2050141
[TLS] Ref: TLS 1.2 & TLS 1.3 Certificates : PQC : I believe that PKI Could be reasoned to understand Alternate Encryption types, Because Certificate size is not limited, Rather bracketed around the 384, 512, 2048, 4192 Bit Sizes[TLS] Ref: TLS 1.2 & TLS 1.3 Certificates : PQC : I believe that PKI Could be reasoned to understand Alternate Encryption types, Because Certificate size is not limited, Rather bracketed around the 384, 512, 2048, 4192 Bit Sizes
Duke Abbaddon
2023-02-05
tls
None
/arch/msg/tls/b4BDiIrg50T6kj_Pho0j7FIXblM/
3272965
2050140
Re: [TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RSRe: [TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS
Christopher Wood
2023-01-29
tls
None
/arch/msg/tls/If8nyjv41FntIgztbCjBUAd9yCI/
3270316
2049121
[TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS[TLS] Fwd: These pdf research documents on elliptic curves are a harder read, i am conversant with classic algebra, can you work them out into Open Source Code for Miracl security C++ & other windows and linux libraries, converting these World class Elliptic curves would earn a lot of linux, windows & IETF.org and NIST Credit, faithfully yours RS
Duke Abbaddon
2023-01-29
tls
None
/arch/msg/tls/XhMK39eWrCECKwKuk7XxlGLZu40/
3270262
2049121
[TLS] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01[TLS] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01
Duke Abbaddon
2023-01-29
tls
None
/arch/msg/tls/gmjkOcHuI_r_uRcyBHHK1zOHYow/
3270140
2049064
[Pqc] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01[Pqc] TLS Research documentation; for the proposal & ratification of Post Quantum & ECDHE Protocols with elliptic curves & EEC S-Box - RS 2023-01
Duke Abbaddon
2023-01-29
pqc
None
/arch/msg/pqc/hhXQ7U8-EctgZlaUXLHuZmpnYHg/
3270139
2049063
[TLS] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS[TLS] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS
Duke Abbaddon
2023-01-26
tls
None
/arch/msg/tls/bnIEoTlaViXuLNzny4Fkzf0Nlsg/
3269584
2048823
[Pqc] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS[Pqc] Light-weight TLS & Elliptic security for assessments & update of PQC & TLS with my own work also but also further reading i have done : RS
Duke Abbaddon
2023-01-26
pqc
None
/arch/msg/pqc/JckXlssJHzofg_eqfzSWabwHVBk/
3269583
2048822
[Pqc] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha[Pqc] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha
Duke Abbaddon
2023-01-26
pqc
None
/arch/msg/pqc/k_YCvNQrvOlACpIvwNwiA1UEQvw/
3269488
2048768
[TLS] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha[TLS] So our answer is complexity; Multiple simple solves; one ontop of another aka (exchange EEC+) EEC AES Polycha
Duke Abbaddon
2023-01-26
tls
None
/arch/msg/tls/XxtTT40YRJ1z_oBkcOa9inDVzbk/
3269487
2048767
[Pqc] tls key sharing agreement : RS[Pqc] tls key sharing agreement : RS
Duke Abbaddon
2023-01-25
pqc
None
/arch/msg/pqc/dD6jzs3ggbiJiBHjuxfVnPrRt8Y/
3269476
2048760
[TLS] tls key sharing agreement : RS I have regarded the tls key sharing agreement & it occurs to me that all modes may be improved with combination of a Nonce-PSK-Type-Key, For example held by the verifying certificate agency such as lets encrypt & SafeSSL & Cloudflare, Submitting a lightly cyphered PSK Key would take milliseconds & consume only 10000th of a second on GB/S Ethernet & therefor be unnoticeable and thus secure for the initiation encounter (c)Rupert S[TLS] tls key sharing agreement : RS I have regarded the tls key sharing agreement & it occurs to me that all modes may be improved with combination of a Nonce-PSK-Type-Key, For example held by the verifying certificate agency such as lets encrypt & SafeSSL & Cloudflare, Submitting a lightly cyphered PSK Key would take milliseconds & consume only 10000th of a second on GB/S Ethernet & therefor be unnoticeable and thus secure for the initiation encounter (c)Rupert S
Duke Abbaddon
2023-01-25
tls
None
/arch/msg/tls/B5hmH3zlpCmBmRqjXmzy-IEZXy8/
3269531
2048796
[Ntp] PSK Data Priorities (c)RS[Ntp] PSK Data Priorities (c)RS
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/KjxyAIeFbWMOxvImy8IOx0uA0Rk/
3265846
2047269
[Ntp] Rotating PSK Script & NTP. (c)RS[Ntp] Rotating PSK Script & NTP. (c)RS
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/u4W4MGKp0uA52NV7sQ04vHHAL38/
3265845
2047268
[Ntp] results matter, So here are some examples : https://www.ssllabs.com/ssltest/analyze.html?d=d.ns4v.icu&latest https://www.ssllabs.com/ssltest/analyze.html?d=dns-v2.ns4v.icu&latest[Ntp] results matter, So here are some examples : https://www.ssllabs.com/ssltest/analyze.html?d=d.ns4v.icu&latest https://www.ssllabs.com/ssltest/analyze.html?d=dns-v2.ns4v.icu&latest
Duke Abbaddon
2023-01-14
ntp
None
/arch/msg/ntp/XVLIvWlgA2W6FIjz7xfGtfUSyrM/
3265844
2047267
[Ntp] Fwd: Performance Evaluation Comparison LIGHTWEIGHT CIPHERS NIST LightWeight Cryptography Requirements : RS[Ntp] Fwd: Performance Evaluation Comparison LIGHTWEIGHT CIPHERS NIST LightWeight Cryptography Requirements : RS
Duke Abbaddon
2023-01-12
ntp
None
/arch/msg/ntp/VkYSGELY7medowvoM-cXo16oDWo/
3265843
2047266
Re: [AVTCORE] I-D Action: draft-ietf-avtcore-aria-sdes-00.txtRe: [AVTCORE] I-D Action: draft-ietf-avtcore-aria-sdes-00.txt
Woo-Hwan Kim
2015-09-01
avt
None
/arch/msg/avt/iLw7-yIoslHizLiVPIGCMrdUDkY/
2077704
1078999
Re: [AVTCORE] I-D Action: draft-ietf-avtcore-aria-sdes-00.txtRe: [AVTCORE] I-D Action: draft-ietf-avtcore-aria-sdes-00.txt
Magnus Westerlund
2015-06-02
avt
None
/arch/msg/avt/PzDDY51IAO2u4InHUhn1pYqwQzQ/
2028421
1078999
Re: [AVTCORE] I-D Action: draft-ietf-avtcore-aria-sdes-00.txtRe: [AVTCORE] I-D Action: draft-ietf-avtcore-aria-sdes-00.txt
Magnus Westerlund
2015-06-02
avt
None
/arch/msg/avt/EGnjyhMup46z5MWt_dhW1rC7_ZM/
2028419
1078999
Re: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txtRe: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txt
Eric Rescorla
2014-09-11
avt
None
/arch/msg/avt/8eHi0Oxlp7k4vlc1vwtt-11DDpo/
1800478
1079106
Re: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txtRe: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txt
Roni Even
2014-09-07
avt
None
/arch/msg/avt/7uJjwQ9OUosgEuCHBmDlxObOwBs/
1797938
1079106
Re: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txtRe: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txt
Barry Leiba
2014-09-07
avt
None
/arch/msg/avt/5N1Mxl6kDUqFD7_sErF_LekP45U/
1797926
1079106
Re: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txtRe: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txt
Eric Rescorla
2014-09-07
avt
None
/arch/msg/avt/WZdGMIJqIMlYl--_b3k_LyJlvsw/
1797919
1079106
Re: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txtRe: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txt
Roni Even
2014-09-07
avt
None
/arch/msg/avt/joN9VsvjeM1K32J26SZg4VkP1tY/
1797895
1079106
Re: [Cfrg] process for cfrg blessing of [insert algorithm name here]Re: [Cfrg] process for cfrg blessing of [insert algorithm name here]
David McGrew
2014-01-13
cfrg
None
/arch/msg/cfrg/MvSvv9uW6o8k2iffcLv81HgO7xo/
291821
1101666
Re: [Cfrg] process for cfrg blessing of [insert algorithm name here]Re: [Cfrg] process for cfrg blessing of [insert algorithm name here]
Sean Turner
2014-01-12
cfrg
None
/arch/msg/cfrg/ItpUSA082VDAWDNRFuW2dgYarjg/
291609
1101666
Re: [Cfrg] process for cfrg blessing of [insert algorithm name here]Re: [Cfrg] process for cfrg blessing of [insert algorithm name here]
Watson Ladd
2014-01-08
cfrg
None
/arch/msg/cfrg/E9Iyv7qE7yhsmd5XlPAQdezfk9c/
291485
1101666
[Cfrg] process for cfrg blessing of [insert algorithm name here][Cfrg] process for cfrg blessing of [insert algorithm name here]
Sean Turner
2014-01-08
cfrg
None
/arch/msg/cfrg/oYNxgTUy-Pg63Ge5QXIlJijko6U/
291476
1101666
Re: [AVTCORE] Writeup comments on draft-ietf-avtcore-aria-srtp-05Re: [AVTCORE] Writeup comments on draft-ietf-avtcore-aria-srtp-05
Woo-Hwan Kim
2013-11-18
avt
None
/arch/msg/avt/ebvc3oR6vJpsHFwjUYUn0Xd6S64/
243584
1079222
[AVTCORE] Writeup comments on draft-ietf-avtcore-aria-srtp-05[AVTCORE] Writeup comments on draft-ietf-avtcore-aria-srtp-05
Magnus Westerlund
2013-10-31
avt
None
/arch/msg/avt/9z_RMtqJXkEUyBxmd4077FYbZyI/
243563
1079222
Document Action: 'Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)' to Informational RFC (draft-nsri-tls-aria-01.txt)Document Action: 'Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)' to Informational RFC (draft-nsri-tls-aria-01.txt)
The IESG
2011-01-24
ietf-announce
None
/arch/msg/ietf-announce/JPzSgL0ZJaj9GB39X0p-u9pfZKE/
670873
1370145
[rfc-dist] RFC 5794 on A Description of the ARIA Encryption Algorithm[rfc-dist] RFC 5794 on A Description of the ARIA Encryption Algorithm
rfc-editor at rfc-editor.org
2010-03-04
rfc-dist
None
/arch/msg/rfc-dist/J9K9h8oVAei6NHU9VtpqzcG8C_U/
2272622
1570502
RFC 5794 on A Description of the ARIA Encryption AlgorithmRFC 5794 on A Description of the ARIA Encryption Algorithm
rfc-editor
2010-03-04
ietf-announce
None
/arch/msg/ietf-announce/Mwu8F-M2YrhEyCv22yqkQAotQ4k/
669622
1371358
40 Messages