The RSA Data Security conference will be held at the Moscone Center and the
Metreon in San Francisco this year, April 8-12.
http://www.rsasecurity.com/conference/rsa2001/intro2.html
It's a really neat conference, but pricey. However, looking through the
registration web
pages, I found this:
I've seen an existance proof which indicates that this is possible.
Back when I was first getting involved with computers (circa 1972),
some digitizer tablets worked by speed-of-sound measurements.
The stylus tip contained a small spark gap which was energized
when the stylus pressed on the
It has all the hallmarks of snakeoil.
After a bit of searching around, I found another article at the Sunday Times
(not noted for it's fact checking) and a company site. I'll include their
page
on the method below. It looks like typical snake oil - the description
includes
a number of errors
Others have responded as to why this is not so hot an idea.
It sounds like your trying to obtain more entropy than you really
need - I would have thought that the built in hardware RNG in
the newer Intel chips would do the job. Barring that, stick in one
of the various cryptographic coprocessor
Wednesday September 6, 8:03 am Eastern Time
Press Release
SOURCE: RSA Security Inc.
RSA Security Releases RSA Encryption Algorithm into Public Domain
'c = m(e) mod n' Made Available Two Weeks Early
BEDFORD, Mass., Sept. 6 /PRNewswire/ -- RSA® Security
Inc. (Nasdaq: RSAS - news) today
I hope that reference is made to Judge Patels determination that
source code (at least) is speech in the Junger(?) case.
Peter Trei
--
From: Steve Bellovin[SMTP:[EMAIL PROTECTED]]
Sent: Wednesday, July 26, 2000 9:52 AM
To: [EMAIL PROTECTED]
Subject: Free
--
From: Ray Hirschfeld[SMTP:[EMAIL PROTECTED]]
Reply To: [EMAIL PROTECTED]
Sent: Tuesday, May 30, 2000 1:18 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Electronic elections.
Date: Mon, 29 May 2000 07:52:24 -0400
--
From: R. A. Hettinga[SMTP:[EMAIL PROTECTED]]
At 9:33 AM -0400 on 5/30/00, Trei, Peter wrote:
If the person whose vote is being coerced has the
coercer looking over their shoulder as they cast it
Just for fun, think about the mathematics of this proposition
I think this is what Bob was trying to reference:
www.onhandpc.com
Peter Trei
--
From: R. A. Hettinga[SMTP:[EMAIL PROTECTED]]
Sent: Monday, December 13, 1999 8:18 AM
To: Digital Bearer Settlement List; [EMAIL PROTECTED];
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Keith Dawson[SMTP:[EMAIL PROTECTED]] writes:
Sent: Thursday, September 30, 1999 9:00 AM
Subject: Rumor of a working quantum computer
To:[EMAIL PROTECTED]
Anyone heard word on this rumor? The Sunday Times story claims
that a European Institute of Quantum Computing Network has
The Visor uses Palm OS, so I don't think it's any better.
Peter Trei
--
From: Robert Hettinga[SMTP:[EMAIL PROTECTED]]
Sent: Tuesday, September 21, 1999 2:49 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; Digital Bearer
Settlement List
Subject: Is There a Visor
--
[EMAIL PROTECTED][SMTP:[EMAIL PROTECTED] wrote:]
Subject: Re: more re Encryption Technology Limits Eased
Bill Simpson said:
- We just learned a few weeks ago that every copy of Windows has a
secret
NSA key. We don't know why. Remember the Lotus Notes secret NSA
The ability to replace the NSA key with another
is an extremely serious vulnerability. This means that
*anyone* - not just the NSA - can write a compromised
module and install it on the target, as long as they
also replace the NSA key with the one they used to
sign the weakened module.
Tripwire,
Bob Silverman, who works downstairs from
me, recently posted the following to
sci.crypt.
Peter Trei
--
From: Bob Silverman [EMAIL PROTECTED]
Newsgroups: sci.crypt
Subject: Shamir's Announcement
Date: Tue, 04 May 1999 17:42:18 GMT
Organization: Deja News -
Rather than argue about April 1 "FireFly"
RFCs and the purported properties of
classified devices, here's a tidbit
of real info:
I asked Eric if the protocols will
be published, so that compatible
software implemenations can be
I hope that this gets to the interested parties in
time
The 1999 RSA Data Security Conference starts this
Sunday in San Jose. New this year, you can get
a free pass for the vendor exhibitions (Mon-Wed)
simply by registering for one at the RSA website
(www.rsa.com).
The deadline for this
This may be drifting off-topic, but...
One serious worry I have concerning
Internet voting schemes is that there
seems to be no consideration of making
the ballot secret.
If I go to my school auditorium to vote,
I fill out the ballot in a little hutch,
and no one but I can see what I have
-Original Message-
From: [EMAIL PROTECTED] [SMTP:[EMAIL PROTECTED]]
[Trei, Peter]
A couple years ago, when the X9 committee -- or maybe one of the X9
crypto subcommittees -- rejected that advice and initially recommended
that
3DES be made a standard, I was told
18 matches
Mail list logo