Groups
Groups
Sign in
Groups
Groups
Encryption and Cryptography Mailing List
Conversations
About
Send feedback
Help
Encryption and Cryptography Mailing List
1–30 of 323
Mark all as read
Report group
0 selected
Saqib Ali
11/29/18
Job opening for a Principal Cryptographer at Seagate Technology
I figured folks on this list might be interested in the following job posting: https://seagate.wd1.
unread,
Job opening for a Principal Cryptographer at Seagate Technology
I figured folks on this list might be interested in the following job posting: https://seagate.wd1.
11/29/18
Saqib Ali
2/28/18
Seminar on The Evolution of Public Key Cryptography at Stanford University
Martin Hellman will speak. This should be interesting: https://ee.stanford.edu/event/seminar/ee380-
unread,
Seminar on The Evolution of Public Key Cryptography at Stanford University
Martin Hellman will speak. This should be interesting: https://ee.stanford.edu/event/seminar/ee380-
2/28/18
Saqib Ali
12/13/16
Homomorphic Encryption research opportunity at Norwegian University of Science and Technology
The researcher will work on a project entitled “Securing emerging network technologies with
unread,
Homomorphic Encryption research opportunity at Norwegian University of Science and Technology
The researcher will work on a project entitled “Securing emerging network technologies with
12/13/16
Saqib Ali
10/28/14
ISO for Homomorphic encryption is being developed
ISO/IEC NP 18033-6 Information technology -- Encryption algorithms -- Part 6: Homomorphic encryption
unread,
ISO for Homomorphic encryption is being developed
ISO/IEC NP 18033-6 Information technology -- Encryption algorithms -- Part 6: Homomorphic encryption
10/28/14
Saqib Ali
10/13/14
Dynamic Searchable Encryption
Dynamic Searchable Encryption with Minimal Data Leakage developed by University of Maryland's
unread,
Dynamic Searchable Encryption
Dynamic Searchable Encryption with Minimal Data Leakage developed by University of Maryland's
10/13/14
Saqib Ali
10/11/14
Securing the cloud with homomorphic encryption
The Next Wave, a quarterly publication of the National Security Agency's Research Directorate has
unread,
Securing the cloud with homomorphic encryption
The Next Wave, a quarterly publication of the National Security Agency's Research Directorate has
10/11/14
Saqib Ali
10/2/14
MacArthur Fellowship awarded Craig Gentry for his work on Fully Homomorphic Encryption algorithm
Congratulations Dr. Craig Gentry. A well deserved award: http://ibmresearchnews.blogspot.com/2014/09/
unread,
MacArthur Fellowship awarded Craig Gentry for his work on Fully Homomorphic Encryption algorithm
Congratulations Dr. Craig Gentry. A well deserved award: http://ibmresearchnews.blogspot.com/2014/09/
10/2/14
Saqib Ali
9/3/14
PQCrypto 2014 Conference and Summer School at University of Waterloo registration open
PQCrypto 2014 is held in co-operation with the International Association for Cryptologic Research (
unread,
PQCrypto 2014 Conference and Summer School at University of Waterloo registration open
PQCrypto 2014 is held in co-operation with the International Association for Cryptologic Research (
9/3/14
Saqib Ali
9/27/13
Privacy: Lack of Awareness of Cyber-security
Technology cannot protect against lack of awareness. This is relevant in the privacy vs. security
unread,
Privacy: Lack of Awareness of Cyber-security
Technology cannot protect against lack of awareness. This is relevant in the privacy vs. security
9/27/13
Saqib Ali
1/10/13
Quantum random number generator and quantum key distribution mechanism
One of finalist in the IBM Smart Camp: http://ibmsmartcamp.com/2013/01/07/meet-the-global-finalists-
unread,
Quantum random number generator and quantum key distribution mechanism
One of finalist in the IBM Smart Camp: http://ibmsmartcamp.com/2013/01/07/meet-the-global-finalists-
1/10/13
Saqib Ali
1/6/13
Quantum Cryptography School for Young Students at University of Waterloo
Students get a first-hand look into the physics and mathematics of quantum mechanics, cryptography
unread,
Quantum Cryptography School for Young Students at University of Waterloo
Students get a first-hand look into the physics and mathematics of quantum mechanics, cryptography
1/6/13
Saqib Ali
2/18/12
Homomorphic split-key encryption OR snake oil crypto
What crypto mumbo jumbo is this? From: http://www.porticor.com/2012/02/thewhir-q-and-a/ -------------
unread,
Homomorphic split-key encryption OR snake oil crypto
What crypto mumbo jumbo is this? From: http://www.porticor.com/2012/02/thewhir-q-and-a/ -------------
2/18/12
Saqib Ali
2/16/12
Heart rhythm as the encryption key
Having problem properly securing the data? Use your heart instead of your head. A researcher from
unread,
Heart rhythm as the encryption key
Having problem properly securing the data? Use your heart instead of your head. A researcher from
2/16/12
Saqib Ali
3/9/11
OS X Lion adds full disk encryption
http://beacon.wharton.upenn.edu/security/2011/03/os-x-lion-adds-full-disk-encryption/
unread,
OS X Lion adds full disk encryption
http://beacon.wharton.upenn.edu/security/2011/03/os-x-lion-adds-full-disk-encryption/
3/9/11
Saqib Ali
1/13/11
Single Sign-On For All Internet Users?
CNBC is running the following poll: http://www.cnbc.com/id/41054421/ (vote away) My thoughts: I like
unread,
Single Sign-On For All Internet Users?
CNBC is running the following poll: http://www.cnbc.com/id/41054421/ (vote away) My thoughts: I like
1/13/11
Andrew
4/13/10
2010 Congress on Computer Applications and Computational Science, Singapore [EI Compendex,ISTP,IEEE Xplore]
[ Please forward to those who may be interested. Thanks. ] ==========================================
unread,
2010 Congress on Computer Applications and Computational Science, Singapore [EI Compendex,ISTP,IEEE Xplore]
[ Please forward to those who may be interested. Thanks. ] ==========================================
4/13/10
chom
,
Wall, Kevin
2
1/4/10
WEP algorithm
What do you mean by "the algorithm"? The *algorithm* _IS_ RC4. --- Kevin W. Wall Qwest
unread,
WEP algorithm
What do you mean by "the algorithm"? The *algorithm* _IS_ RC4. --- Kevin W. Wall Qwest
1/4/10
Ali, Saqib
, …
Garrett M. Groff
3
11/24/09
Building a Better Password
Both PGP WDE and BitLocker maintain a relatively small portion of the disk that is unencrypted. This
unread,
Building a Better Password
Both PGP WDE and BitLocker maintain a relatively small portion of the disk that is unencrypted. This
11/24/09
apacs70
11/16/09
Decimal-based length-preserving cryptosystem
Hi, I'm looking for suggestions to address following problem. I want to encrypt sequence of
unread,
Decimal-based length-preserving cryptosystem
Hi, I'm looking for suggestions to address following problem. I want to encrypt sequence of
11/16/09
Ali, Saqib
9/27/09
[FDE] FDE List Moving to Google Groups
Hello All, The FDE Mailing List is moving to Google Groups. The URL for the mailing list is: http://
unread,
[FDE] FDE List Moving to Google Groups
Hello All, The FDE Mailing List is moving to Google Groups. The URL for the mailing list is: http://
9/27/09
Ali, Saqib
9/25/09
[FDE] Stealing credit card numbers from corporate computers is a serious crime, but it is not “identity theft.”
Why does terminology matter? Larry Downes explains: "No one's “identity” is being stolen,
unread,
[FDE] Stealing credit card numbers from corporate computers is a serious crime, but it is not “identity theft.”
Why does terminology matter? Larry Downes explains: "No one's “identity” is being stolen,
9/25/09
Ali, Saqib
8/8/09
[FDE] David Vladeck on privacy and the inutility of “notice and consent”
In an interview with NYTimes, David Vladeck, the Director of the FTC Bureau of Consumer Protection,
unread,
[FDE] David Vladeck on privacy and the inutility of “notice and consent”
In an interview with NYTimes, David Vladeck, the Director of the FTC Bureau of Consumer Protection,
8/8/09
Garrett M. Groff
, …
Dmitry Obukhov
15
7/17/09
[FDE] Q concerning hardware-based encryption/security
Daniel, When screen lock is activated, the system can continue actively use its drive. For example,
unread,
[FDE] Q concerning hardware-based encryption/security
Daniel, When screen lock is activated, the system can continue actively use its drive. For example,
7/17/09
Ali, Saqib
7/8/09
[FDE] Weakness in Social Security Numbers Is Found
Read more: http://www.nytimes.com/2009/07/07/us/07numbers.html?_r=2&ref=instapundit
unread,
[FDE] Weakness in Social Security Numbers Is Found
Read more: http://www.nytimes.com/2009/07/07/us/07numbers.html?_r=2&ref=instapundit
7/8/09
Wall, Kevin
, …
Garrett M. Groff
3
7/1/09
Re: [FDE] FDE Digest, Vol 32, Issue 4
In response to Kevin... TPMs are rapidly becoming a normal part of desktops and laptops, thankfully.
unread,
Re: [FDE] FDE Digest, Vol 32, Issue 4
In response to Kevin... TPMs are rapidly becoming a normal part of desktops and laptops, thankfully.
7/1/09
Ali, Saqib
6/25/09
[FDE] IBM's Plans for Nimbler Encryption
http://www.forbes.com/2009/06/24/encryption-rsa-privacy-technology-breakthroughs-ibm.html
unread,
[FDE] IBM's Plans for Nimbler Encryption
http://www.forbes.com/2009/06/24/encryption-rsa-privacy-technology-breakthroughs-ibm.html
6/25/09
Ali, Saqib
6/12/09
[FDE] OT: Google Apps Authentication and Access Control Survey
Hello All, If your institution/corporation currently uses Google Apps please take few minutes to
unread,
[FDE] OT: Google Apps Authentication and Access Control Survey
Hello All, If your institution/corporation currently uses Google Apps please take few minutes to
6/12/09
Fran Baena
, …
Dmitry Obukhov
40
6/9/09
[FDE] how FDE is implemented at system layer
Hi Scott, The increase of main CPU computational power will change the picture only when taken out of
unread,
[FDE] how FDE is implemented at system layer
Hi Scott, The increase of main CPU computational power will change the picture only when taken out of
6/9/09
Abhilasha Bhargav-Spantzel
, …
Glancey, Bryan
3
6/9/09
[FDE] Who encrypts desktops in Enterprise environments
I would suggest a quick scan of the press releases for the Major FDE players gives you a good sense.
unread,
[FDE] Who encrypts desktops in Enterprise environments
I would suggest a quick scan of the press releases for the Major FDE players gives you a good sense.
6/9/09
Gary Flynn
, …
Glancey, Bryan
3
6/4/09
[FDE] re how FDE is implemented at system layer
You are so right. FDE vendors - H/W or S/W should be more transparent. The truth of this whole matter
unread,
[FDE] re how FDE is implemented at system layer
You are so right. FDE vendors - H/W or S/W should be more transparent. The truth of this whole matter
6/4/09