following-up to my own post:
On Wed, May 9, 2012 at 6:34 AM, Zooko Wilcox-O'Hearn zo...@zooko.com wrote:
1. Decrypt the data,
2. Verify the integrity of the data,
3. Generate MAC tags for other data which would pass the integrity check.
The fact that 3 is included in that bundle of
In a long message, Zooko Wilcox-O'Hearn wrote, in part:
the person who has the authority to sign the message
can *not* sign new messages
it means that the data is immutable once transmitted, even to
someone who has all of the secrets that the original sender had.
This looks like a
The DIAC submission page is now open, with a deadline at the end of
Monday 7 May (American Samoa time):
http://hyperelliptic.org/conferences/diac/iChair/submit.php
DIAC is an ECRYPT-sponsored workshop that will take place 5--6 July in
Stockholm, in particular evaluating the idea of a new
On Wed, May 2, 2012 at 8:00 PM, D. J. Bernstein d...@cr.yp.to wrote:
I should emphasize that an authenticated-cipher competition would be
much more than an AE mode competition. There are certainly people
working on new ways to use AES, but there are many more people working
on new