RE: No free spam

2001-05-20 Thread Amir Herzberg
James E. Donald said, Amir Herzberg wrote: Another BTW, the other application I really want micropayments for (and was my first motivation to this if I recall correctly) is also crypto-related... it is to motivate people to produce reviews of products, services, and esp. other

e-journals in applied crypto / secure e-commerce

2001-07-17 Thread Amir Herzberg
I'll appreciate recommendations of good, preferably referred, e-journals for reading and writing on applied cryptography and secure e-commerce. Thanks! Best regards, Amir Herzberg CTO, NewGenPay Inc. http://www.newgenpay.com/Amir/Herzberg.htm SMS (urgent only!): _subject_ of email

RE: The tragedy in NYC

2001-09-13 Thread Amir Herzberg
of abuse by government. Best, Amir Herzberg - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

RE: crypto backdoors = terrorisms free reign

2001-09-16 Thread Amir Herzberg
, respectively). Attacker encrypts his data with TRICK and then with GEEK. So this is validly GEEK encrypted data. Until the NSA tries to decipher it, it looks fine. (As far as I know, sending this message is still legal. I definitely hope so.) Best, Amir Herzberg

RE: Forward Security Question

2001-11-19 Thread Amir Herzberg
is restored (attacker cannot decrypt or forge future traffic). See formal definition and implementation in [CHH00]. Best regards, Amir Herzberg Please use my new e-mail: [EMAIL PROTECTED] [CHH00] Ran Canetti, Shai Ha-Levi and Amir Herzberg. Maintaining authenticated communication in the presence

Authenticating logos

2002-01-16 Thread Amir Herzberg
validates that the server has a certificate for the logo; standard SSL certificates may not provide this, but they can contain an address where the proxy can go get the necessary additional certificates. If anybody is interested in taking this project further, I'll be happy to help. Best, Amir

RE: Authenticating logos

2002-01-17 Thread Amir Herzberg
) and for reward and punishment (I'll give you a certificate if I'm happy with your work, and create a web site about your lousy service). Cheers, Amir Herzberg See http://amir.beesites.co.il for lectures and notes (draft of chapters) on `secure communication and commerce using cryptography

available draft chapters and lectures on `secure communication and commerce using crypto`

2002-02-01 Thread Amir Herzberg
] 21. Advanced protocols voting, gambling, 22. Conclusion and social/legal issues [TBD] Cheers, Amir Herzberg

RE: Losing the Code War by Stephen Budiansky

2002-02-03 Thread Amir Herzberg
(esp. in software) is needed. Cheers, Amir Herzberg See http://amir.beesites.co.il/book.html for lectures and notes (draft of chapters) on `secure communication and commerce using cryptography`; feedback welcome

RE: Cringely ...or- long-lasting encryption - motivation for ECC?

2002-02-06 Thread Amir Herzberg
is encrypted) among several secure storage units (secret sharing) -- The same, but proactively re-hashing the shares periodically, so that an attacker must collect all shares during the same period (proactive secret sharing). Regards, Amir Herzberg See http://amir.beesites.co.il/book.html

RE: theory: unconditional security

2002-02-21 Thread Amir Herzberg
). Of course, the reason one-time signatures are used for these applications is because they are faster, not because they are unconditionally secure. Regards, Amir Herzberg See http://amir.beesites.co.il/book.html for lectures and draft-chapters from book-in-progress, `secure communication

RE: crypto question - using crypto to protect financial transactions

2002-04-08 Thread Amir Herzberg
. Regards, Amir Herzberg See http://amir.beesites.co.il/book.html for lectures and draft-chapters from book-in-progress, `secure communication and commerce using cryptography`; feedback welcome! - The Cryptography Mailing List

Fwd: Re: Quantum Computing Puts Encrypted Messages at Risk

2002-07-14 Thread Amir Herzberg
. As to quantum computation signalling the end of `crypto as we know it`... Is it fair to say this may end only the mechanisms built on discrete log and/or factoring, but not shared key algorithms like AES and some of the other public key algorithms? Best, Amir Herzberg

RE: building a true RNG

2002-07-27 Thread Amir Herzberg
vulnerabilities in protocols, but no specific hash function is really a random oracle... So I ask: is there a definition of this `no wasted entropy` property, which hash functions can be assumed to have (and tested for), and which ensures the desired extraction of randomness? Regards, Amir

RE: building a true RNG

2002-07-30 Thread Amir Herzberg
against, and which is sufficient to make the `entropy crunching alg` secure? I found that when trying to explain and define hash functions and their properties, I didn't find a satisfactory definition for the `randomness` properties. Best Regards, Amir Herzberg See http://amir.herzberg.name/book.html

Extracting unifrom randomness from noisy source

2002-08-04 Thread Amir Herzberg
. Of course under the random oracle model, h(x,k) is also a pseudo-random function... But why? Regards, Amir Herzberg See http://amir.herzberg.name/book.html for lectures and draft-chapters from book-in-progress, `Introduction to Cryptography, Secure Communication and Commerce`; feedback appreciated

RE: 'E-postmark' gives stamp of approval

2002-12-01 Thread Amir Herzberg
://eprint.iacr.org/2002/084/). Regards, Amir Herzberg http://amir.herzberg.name -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of R. A. Hettinga Sent: Wednesday, November 27, 2002 5:07 PM To: Digital Bearer Settlement List; [EMAIL PROTECTED] Subject: 'E-postmark

Security, Cryptography and Privacy Track in PODC 2003: Tutorials and (updated) CFP

2002-12-24 Thread Amir Herzberg
and to see you in PODC 2003! Amir Herzberg http://amir.herzberg.name Content Protection Technologies Jeffrey B. Lotspiech, Tushar Chandra, Donald E. Leake Jr. Abstract The entertainment industry is in the midst of a digital revolution, the growth of which seems only limited by concerns about