On Fri, Mar 13, 2009 at 1:16 PM, Travis
travis+ml-cryptogra...@subspacefield.org wrote:
I have never seen a good catalog of computationally-strong
pseudo-random number generators.
Here is a list of the FIPS-approved random number generators:
pgut...@cs.auckland.ac.nz (Peter Gutmann) on Thursday, May 7, 2009 wrote:
Paul Hoffman paul.hoff...@vpnc.org writes:
Peter, you really need more detents on the knob for your hyperbole setting.
nothing happened is flat-out wrong: the CA fixed the problem and researched
all related problems that
On Thu, 30 Apr 2009 17:44:53 -0700
Jon Callas j...@callas.org wrote:
The accepted wisdom
on 80-bit security (which includes SHA-1, 1024-bit RSA and DSA keys,
and other things) is that it is to be retired by the end of 2010.
That's an interesting statement from a historical perspective -- is
On behalf of the program committee, may I please direct
your attention to your possible participation MetriCon 4.0.
The MetriCon 4.0 Workshop will be held on Tuesday, August 11,
2009, in Montreal, Quebec, co-located with the USENIX Security
Symposium. All who are interested in participating
Bill Frantz fra...@pwpconsult.com writes:
So my reaction is to say that it's all a big stinking pile and try to develop
systems and procedures that don't rely on CAs. (e.g. curl with a copy of the
server's self-signed certificate, the Petname toolbar, etc.)
The problem with this is that recent
of possible (topical) interest...
Stanford EE Computer Systems Colloquium
4:15PM, Wednesday, May 13, 2009
HP Auditorium, Gates Computer Science Building B01
http://ee380.stanford.edu[1]
Topic:Accelerating computation with FPGAs
pgut...@cs.auckland.ac.nz (Peter Gutmann) on Thursday, May 7, 2009 wrote:
If SSL/TLS had as part of its handshake, a list of CAs that are acceptable to
the client, I could configure my browser with only high-reputation CAs.
Uhh, how is that meant to work?
The client hello message would include