Travis H. [EMAIL PROTECTED] writes:
On 5/14/06, Victor Duchovni [EMAIL PROTECTED] wrote:
Security is fragile. Deviating from well understood primitives may be
good research, but is not good engineering. Especially fragile are:
Point taken. This is not for a production system, it's a
I've googled for New Hash Functions and their Use in Authentication
and Set Equality and found several citations but no electronic
copies. I don't have access to a library that might have it, does
anyone here have one? Thanks.
http://www.garlic.com/~lynn/rfcidx14.htm#4492
4492 I
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer
Security (TLS), Blake-Wilson S., Bolyard N., Gupta V., Hawk C., Moeller
B., 2006/05/16 (35pp) (.txt=72231) (Refs 2246, 3268, 3279, 3280, 4346,
4366) (was
[EMAIL PROTECTED] writes:
You and I are in agreement, but how do we get
the seemingly (to us) plain truth across to
others? I've been trying for a good while now,
reaching a point where I'd almost wish for a
crisis of some sort as persuasiveness is not
working.
We are probably
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
The thing I've always wondered about stream ciphers is why we only
talk about linear ones. A stream cipher is fundamentally constructed
of two things: A stream of bits (alleged to be unpredictable) as
long as
Call for Participation
Intensive Program on Information and Communication Security
IPICS 2006 Summer Course
17-28 July 2006, K.U. Leuven, Belgium
https://www.cosic.esat.kuleuven.be/ipics2006/?i=S
Special Focus: Privacy Technology (26-28 July)
IPICS is a two week long summer school intended for
Cartoon of the day:
http://www.ibiblio.org/Dave/Dr-Fun/df200605/df20060517.jpg
[Hat tip to Steve Bellovin for pointing it out to me...]
--
Perry E. Metzger[EMAIL PROTECTED]
-
The Cryptography Mailing List