- Are AES 256-bit keys too large?
- Examples of Risk Profile Graphs
- Another crack at open Rainbow Tables for A5/1
- AES-256 and Reputational Risk
- The cost of SHA-1 collisions reduced to 2^{52}
- Entrust PKI v5 Overview
- Weapons of Math Instruction: The Birthday Paradox
- The spin on passwords for AES
- FreeMind and Flash
- Long Tail of Vulnerability for A5/1
On the other hand, if we rank posts by the average time spent reading the post, then a different picture emerges. Below I list the top 10 posts that have had at least 20 views by largest average visit time
- Marcus Ranum and the Points of No Return
- Metrics for Managing Project Risk
- Quantum Computing: are you Shor?
- The Sub-Time Crisis in Web 2.0
- Self-Destructing Digital Data with Vanish
- A USB Entropy Drive
- AES-256 and Reputational Risk
- Major Risks in the IT Industry
- Excellent Awareness talk from British Airways
- Long Tail of Vulnerability for A5/1