James E. Donald said,
Amir Herzberg wrote:
Another BTW, the other application I really want
micropayments for (and was my first motivation to this if I
recall correctly) is also crypto-related... it is to motivate
people to produce reviews of products, services, and esp.
other
I'll appreciate recommendations of good, preferably referred, e-journals for
reading and writing on applied cryptography and secure e-commerce.
Thanks!
Best regards,
Amir Herzberg
CTO, NewGenPay Inc.
http://www.newgenpay.com/Amir/Herzberg.htm
SMS (urgent only!): _subject_ of email
of
abuse by government.
Best, Amir Herzberg
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
, respectively).
Attacker encrypts his data with TRICK and then with GEEK. So this is validly
GEEK encrypted data. Until the NSA tries to decipher it, it looks fine.
(As far as I know, sending this message is still legal. I definitely hope
so.)
Best, Amir Herzberg
is restored (attacker
cannot decrypt or forge future traffic). See formal definition and
implementation in [CHH00].
Best regards,
Amir Herzberg
Please use my new e-mail: [EMAIL PROTECTED]
[CHH00] Ran Canetti, Shai Ha-Levi and Amir Herzberg. Maintaining
authenticated communication in the presence
validates that the
server has a certificate for the logo; standard SSL certificates may not
provide this, but they can contain an address where the proxy can go get
the necessary additional certificates.
If anybody is interested in taking this project further, I'll be happy
to help.
Best,
Amir
) and for reward and punishment (I'll give you a
certificate if I'm happy with your work, and create a web site about
your lousy service).
Cheers,
Amir Herzberg
See http://amir.beesites.co.il for lectures and notes (draft of
chapters) on `secure communication and commerce using cryptography
]
21. Advanced
protocols voting, gambling,
22.
Conclusion and social/legal issues [TBD]
Cheers,
Amir
Herzberg
(esp. in
software) is needed.
Cheers,
Amir Herzberg
See http://amir.beesites.co.il/book.html for lectures and notes (draft
of chapters) on `secure communication and commerce using cryptography`;
feedback welcome
is
encrypted) among several secure storage units (secret sharing)
-- The same, but proactively re-hashing the shares periodically, so that
an attacker must collect all shares during the same period (proactive
secret sharing).
Regards,
Amir Herzberg
See http://amir.beesites.co.il/book.html
). Of
course, the reason one-time signatures are used for these applications
is because they are faster, not because they are unconditionally secure.
Regards, Amir Herzberg
See http://amir.beesites.co.il/book.html for lectures and
draft-chapters from book-in-progress, `secure communication
.
Regards, Amir Herzberg
See http://amir.beesites.co.il/book.html for lectures and
draft-chapters from book-in-progress, `secure communication and commerce
using cryptography`; feedback welcome!
-
The Cryptography Mailing List
. As to quantum computation signalling the end of `crypto as we know
it`... Is it fair to say this may end only the mechanisms built on
discrete log and/or factoring, but not shared key algorithms like AES and
some of the other public key algorithms?
Best, Amir Herzberg
vulnerabilities in
protocols, but no specific hash function is really a random oracle...
So I ask: is there a definition of this `no wasted entropy` property, which
hash functions can be assumed to have (and tested for), and which ensures
the desired extraction of randomness?
Regards, Amir
against, and which is sufficient to make the `entropy crunching alg` secure?
I found that when trying to explain and define hash functions and their
properties, I didn't find a satisfactory definition for the `randomness`
properties.
Best Regards, Amir Herzberg
See http://amir.herzberg.name/book.html
. Of course under the random oracle model, h(x,k) is also a
pseudo-random function... But why?
Regards, Amir Herzberg
See http://amir.herzberg.name/book.html for lectures and draft-chapters
from book-in-progress, `Introduction to Cryptography, Secure
Communication and Commerce`; feedback appreciated
://eprint.iacr.org/2002/084/).
Regards,
Amir Herzberg
http://amir.herzberg.name
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of R.
A. Hettinga
Sent: Wednesday, November 27, 2002 5:07 PM
To: Digital Bearer Settlement List; [EMAIL PROTECTED]
Subject: 'E-postmark
and to see you in PODC 2003!
Amir Herzberg
http://amir.herzberg.name
Content Protection Technologies
Jeffrey B. Lotspiech, Tushar Chandra, Donald E. Leake Jr.
Abstract
The entertainment industry is in the midst of a digital revolution,
the growth of which seems only limited by concerns about
18 matches
Mail list logo