At 01:07 AM 7/1/02 +0200, Hadmut Danisch wrote:
As a consequence, it is not enough to just
encrypt the connection between the computer
and the monitor or the keyboard. An encryption of
the connection between the computer and the
authorized person itself is needed.
The solution would be to
--- begin forwarded text
Status: U
Date: Tue, 2 Jul 2002 04:34:12 -0500 (CDT)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Feds may require all email to be kept by ISP's
Sender: [EMAIL PROTECTED]
Reply-To: InfoSec News [EMAIL PROTECTED]
Forwarded from: kam [EMAIL
http://www.washingtonpost.com/ac2/wp-dyn/A9558-2002Jul1?language=printer
washingtonpost.com
Alliance Proposes Cybersecurity Agency
Gail Repsher Emery
Washington Technology Staff Writer
Monday, July 1, 2002; 3:38 PM
A cybersecurity agency should be created in the proposed Department of
Hi,
I was just wondering if anyone knew where to get a good explanation of
Montgomery multiplication
for the non-mathematician? I have a fair bit of maths but not what is
needed to understand his paper.
Thanks for your help,
Damien.
On Tue, 2 Jul 2002, Damien O'Rourke wrote:
Hi,
I was just wondering if anyone knew where to get a good explanation of
Montgomery multiplication
for the non-mathematician? I have a fair bit of maths but not what is
needed to understand his paper.
It's kind of an exotic technique, but it's
I was just wondering if anyone knew where to get
a good explanation of Montgomery multiplication
for the non-mathematician?
here's an explanation i wrote a couple of years ago:
- don davis, boston
what's going on with montgomery reduction:
do you remember
--
On 2 Jul 2002 at 11:04, bear wrote:
With positionally-notated integers, You need time N squared, or
at least N log N (I seem to remember that there was an N log N
technique, but I don't remember what it was and may be
mistaken), relative to the length of the integers themselve.
Damien O'Rourke [EMAIL PROTECTED] writes:
Hi,
I was just wondering if anyone knew where to get a good explanation of
Montgomery multiplication
for the non-mathematician? I have a fair bit of maths but not what is
needed to understand his paper.
I wrote a guide to the explanation in
[EMAIL PROTECTED] writes:
In other words, when the MB is fried because of some freak electrical
surge, I'm screwed, because I can't put the HD into another machine
and get the data off it?
What's wrong with your backups? :-)
This is like a problem Windows already has: if you move a disk onto
I think his comment is can you cannot backup the key.
Maybe the answer is that the key is in the processor and you must
1. get a new identity whenever you change processor chips and
2. that moving disks from machine to machine is not possible, only
plaintext copy.
Seems workable to me :^(
From: [EMAIL PROTECTED]
[EMAIL PROTECTED] writes:
In other words, when the MB is fried because of some freak electrical
surge, I'm screwed, because I can't put the HD into another machine
and get the data off it?
What's wrong with your backups? :-)
This is like a problem Windows
--
On 2 Jul 2002 at 15:45, [EMAIL PROTECTED] wrote:
In other words, when the MB is fried because of some freak
electrical surge, I'm screwed, because I can't put the HD into
another machine and get the data off it?
Only that data that you choose to associate with that specific
- Forwarded message -
Reviewing the Microsoft DRM OS (Palladium Patent) it became
apparent Richard Stallman's short story, The Right to Read
is indeed visionary. Stallman wrote the story back in 1997,
about a dystopian society which borders on Orwell's 1984.
The Right to Read can be
13 matches
Mail list logo