http://xmlhack.com/read.php?item=1570
Encryption, Decryption reach Candidate Recommendation
20:01, 6 Mar 2002 UTC | Simon St.Laurent
The W3C has released XML Encryption Syntax and Processing and Decryption
Transform for XML Signature as Candidate Recommendations, as well as a new
XML
A question: assuming, you have a class of random number generators with
lots of internal state. (Lots: like 10^6 bits). Let's say the evolution
through state space of that generator is provably reversible (or nearly
reversible), and that the Hamiltonian of the system is stochastic (system
:10:49 +0100 (CET)
From: Robert Harley [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: Cringely Gives KnowNow Some Unbelievable Free Press...
Eugene Leitl wrote:
If you want to see EC used you need to describe a specific algorithm
which has the following three properties:
(1) widely agreed
2002 11:10:49 +0100 (CET)
From: Robert Harley [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: Cringely Gives KnowNow Some Unbelievable Free Press...
Eugene Leitl wrote:
If you want to see EC used you need to describe a specific algorithm
which has the following three properties:
(1) widely
-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3
-- Forwarded message --
Date: Sun, 27 Jan 2002
anybody used that combo?
-- Forwarded message --
Date: Sun, 27 Jan 2002 12:45:21 -0800
From: Don Marti [EMAIL PROTECTED]
To: Linux Elitists List [EMAIL PROTECTED]
Subject: Re: [linux-elitists] Re: Looking back ten years: Another
Cypherpunks failure (fwd)
begin Eugene Leitl
On Tue, 15 Jan 2002, D. A. Honig wrote:
[Moderator's note: Except that's precisely the point: Modulo MIM
attacks is like saying we're all immortal, modulo death. The
question isn't some sort of mystification of identity -- it is being
able to know that you're talking to the same Dear Abby
On Fri, 4 Jan 2002, Hack Hawk wrote:
It surprises me that providers like Earthlink GTE (I have one DSL on
each) aren't taking measures to filter out virus traffic from infected
systems. It seems a simple enough task to me.
A *very* bad idea. First, the traffic doesn't bother me,
On Tue, 27 Nov 2001, P.J. Ponder wrote:
It seems to me that something like Integrity Master from Stiller Research
(http://www.stiller.com) would detect the installation of the FBI (or
other) logger. This type of anti-virus software notes changes to files,
Of course you use OS functions to
On Tue, 27 Nov 2001, Gilles Gravier wrote:
Jetico ( http://www.jetico.com/ ) has a hard disk encryption software
called BestCrypt, which can actually intercept the keystrokes at BIOS
level, get the correct keys and re-maps them to random for upper
Linux doesn't have a BIOS level so this
-- Forwarded message --
Date: Thu, 25 Oct 2001 11:32:53 -0400
From: Dan York [EMAIL PROTECTED]
To: linux-elitists [EMAIL PROTECTED]
Subject: [linux-elitists] W3C last call on XML Encryption...
FYI, the W3C has issued a last call for comments on several
proposals related to XML
Gale http://www.gale.org/ seems a well thought out infrastructure. Is the
consensus this is it, or have I missed any alternatives?
TIA,
-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO : N48 10'07'' E011 33'53''
-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3
-- Forwarded message --
Date: Wed,
-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3
-- Forwarded message --
Date: Tue,
On Tue, 3 Jul 2001 [EMAIL PROTECTED] wrote:
there is even simpler misappropriation ... that of virus on the machine
... how do you really know what your computer is doing.
The more control you have over your machine, and the environment, the more
security you have. By hiding sensitive tasks
Military intelligence folks have always been very adept in
playing with the press. By throwing a juicy sausage one after
another into the kennel, you can keep the dogs chasing their own
tails indefinitely. (It's fun, too, unless you happen to be a dog).
Professional paranoia would seem to
David Honig wrote:
Under an assumed name
SOP pp. 5-7.
Both Altera and Xilinx have their own FPGA-embeddable soft CPUs,
as well as supporting other popular CPU designs (e.g., ARM) which are also
available in HDLs.
Unfortunately, I think here's another nucleus for future bloat growth,
and
17 matches
Mail list logo