skip to main | skip to sidebar

No Tricks

Risk, Security, Math, Crypto

Monday, November 16, 2009

All Posts on Entropy

I have collected all my entropy posts here for convenient reference

  • Passwords for USB Keypads
  • A USB Entropy Drive
  • Randomness Tests for Packed Malware
  • On the Entropy of Fingerprints
  • Entropy Bounds for Traffic Confirmation
  • NIST, Passwords and Entropy
Bookmark and Share
Posted by Unknown at 3:44 PM
Labels: Entropy

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

Unknown
View my complete profile

Quick Links

  • Home
  • Luke O'Connor Bio
  • Top Posts
  • Favourite Posts
  • Scribd Collections
  • The No Tricks Name

Subscribe

Posts
Atom
Posts
Comments
Atom
Comments

ALL POSTS

  • on AES and A5/1
  • on Passwords
  • on the Birthday Paradox
  • on Entropy
  • with FreeMind outlines

Search This Blog

Blog Archive

  • ►  2013 (3)
    • ►  April (2)
    • ►  February (1)
  • ►  2012 (2)
    • ►  May (2)
  • ►  2011 (32)
    • ►  October (4)
    • ►  September (13)
    • ►  August (5)
    • ►  June (2)
    • ►  May (1)
    • ►  April (2)
    • ►  March (4)
    • ►  January (1)
  • ►  2010 (116)
    • ►  December (7)
    • ►  October (1)
    • ►  September (7)
    • ►  August (14)
    • ►  June (1)
    • ►  May (38)
    • ►  April (7)
    • ►  March (15)
    • ►  February (24)
    • ►  January (2)
  • ▼  2009 (111)
    • ►  December (9)
    • ▼  November (26)
      • Visualisations of Data Loss
      • TLS Renegotiation Attack Whitepaper
      • How big is 2^{128}?
      • The Other Google Desktop
      • Death Star Threat Modeling
      • How fast are Debian-flawed certificates being re-i...
      • The TLS Renegotiation Attack for the Impatient
      • Navigation map of the Cloud Ecosystem
      • FUDgeddaboudit
      • MasterCard bets on A5/1
      • Growth of Wal-mart across America
      • Not so sunny for Whit Diffie
      • mini-Bruce for $89
      • More on TMTO and Rainbow Tables
      • All Posts on Entropy
      • All Posts on the Birthday Paradox
      • The Internet Repetition Code
      • All Posts on Security with FreeMind and Flash
      • All Posts on AES and A5/1
      • All Posts on Passwords
      • Security Muggles
      • Quadratic Football Revisited
      • Recent uploads to Scribd
      • Outline of a book on Passwords
      • Upcoming Black Swan talk at ZISC
      • Security FreeMind map sources
    • ►  October (3)
    • ►  September (6)
    • ►  August (3)
    • ►  July (3)
    • ►  June (13)
    • ►  May (9)
    • ►  April (11)
    • ►  March (9)
    • ►  February (5)
    • ►  January (14)
  • ►  2008 (25)
    • ►  December (7)
    • ►  November (3)
    • ►  October (2)
    • ►  August (3)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2007 (2)
    • ►  October (1)
    • ►  September (1)

Lijit Search

Lijit Search

Labels

  • A5/1 (7)
  • AES (9)
  • Analysis (3)
  • Anonymity (7)
  • AV (4)
  • Awareness (3)
  • Biometric (2)
  • Birthday Paradox (5)
  • Black Swan (11)
  • Block Cipher (1)
  • Blogging (15)
  • Books (5)
  • Border Search (1)
  • BP (1)
  • Browser (4)
  • Bruce (3)
  • Brute Force (2)
  • Buffer Overflow (1)
  • Business Insider (1)
  • business models (1)
  • CAPTCHA (2)
  • Certificates (1)
  • Charting (2)
  • Choice (1)
  • Chrome (1)
  • CISO (1)
  • cloud computing (11)
  • coincidences (2)
  • Cold Boot (2)
  • Conficker (4)
  • controls (1)
  • Course (2)
  • cryptography (10)
  • Data (5)
  • Data Breach (4)
  • Data Center (1)
  • Data Centric Security (4)
  • DDoS (1)
  • DES (1)
  • DNS (3)
  • DoD (1)
  • education (2)
  • Elliptic Curves (1)
  • Email (2)
  • Encrypted search (4)
  • Encryption (14)
  • ENISA (3)
  • Entropy (7)
  • Estimation (1)
  • Excel (2)
  • Facebook (4)
  • Factoring (3)
  • faraday (2)
  • Fault Injection (2)
  • Fibonnaci (1)
  • FireFox (1)
  • framework (1)
  • FreeMind (6)
  • FSA (1)
  • FUD (2)
  • Gambling (1)
  • games (1)
  • Google (6)
  • GPS (3)
  • GPU (1)
  • Green IT (1)
  • GSM (3)
  • Half Life (2)
  • Hashing (2)
  • HP (1)
  • Humour (6)
  • IBM (6)
  • ICANN (2)
  • IE (2)
  • IEEE (1)
  • IEP (2)
  • Infographic (3)
  • Interesting (4)
  • iPad (1)
  • iPhone (1)
  • ISACA (2)
  • IT (1)
  • IT Risk (3)
  • Key Lengths (3)
  • Key Management (1)
  • Koobface (1)
  • Language (1)
  • Long Tail (3)
  • Lottery (1)
  • Malware (4)
  • Metrics (1)
  • microsoft (5)
  • Mind mapping (6)
  • Natural Catastrophe (2)
  • New School of Information Security (1)
  • NIST (3)
  • NodeXL (1)
  • NSA (1)
  • One Way Hash Arguments (1)
  • Online transactions (1)
  • Open Source (2)
  • OWASP (3)
  • P2P (1)
  • PageRank (3)
  • Passwords (28)
  • phishing (1)
  • PKI (2)
  • policy (1)
  • Power Laws (4)
  • PowerPoint (2)
  • Predictions (2)
  • Presentation (6)
  • Prezi (1)
  • Privacy (5)
  • Probability (4)
  • Project Risk (1)
  • Quantitative (2)
  • Quantum Computing (2)
  • quantum cryptography (1)
  • R Programming Language (1)
  • Rainbow Tables (4)
  • Random Graph Theory (1)
  • Randomness (5)
  • RC4 (2)
  • re-keying (1)
  • Redundancy (1)
  • renegotiation attack (3)
  • Reputational Damage (1)
  • Research (1)
  • Retrospective (6)
  • RFID (2)
  • Risk Factors (6)
  • Risk Management (20)
  • roundup (3)
  • RSA (5)
  • Satellites (2)
  • Scenario Driven Risk Analysis (1)
  • scribd (20)
  • SDL (2)
  • Security (38)
  • Security Management (1)
  • Skype (1)
  • Social Engineering (1)
  • Social Media (3)
  • SOX (1)
  • Spam (2)
  • Spreadsheet (1)
  • SSD (1)
  • ssl (8)
  • Star Wars (2)
  • statistical tests (1)
  • Statistics (2)
  • SUN (1)
  • TED (1)
  • Threat Modeling (4)
  • Tipping Point (1)
  • TLS (3)
  • TMTO (2)
  • ToR (2)
  • Trends (2)
  • trojan (1)
  • Turing (1)
  • Twitter (7)
  • uncertainty (1)
  • USB (7)
  • VaR (1)
  • VeriSign (1)
  • Video (1)
  • Visualization (21)
  • Vulnerabilities (2)
  • Weapons of Math Instruction (1)
  • web 2.0 (9)
  • Whit Diffie (2)
  • Whitelisting (3)
  • whitepaper (2)
  • Wikileaks (1)
  • Windows (1)
  • Wireless (2)
  • Wisdom of Crowds (2)
  • Worm (1)
  • WPA (1)
  • X509 (1)
  • YouTube (1)
  • Zero Knowledge Proof (1)
 

Apture