At 10:04 AM 3/7/2003 +, Ben Laurie wrote:
Indeed. The commonly used one is ECPP which uses elliptic curves cunningly
to not only prove primality, but to produce a certificate which can be
quickly verified.
Probabilistic prime tests are just that - probable. ECPP actually proves it.
Does
At 02:30 PM 3/5/2003 -0500, Steven M. Bellovin wrote:
From: Somebody
Technically, since their signal speed is slower than light, even
transmission lines act as storage devices.
Wire tapping is now legal.
The crucial difference, from a law enforcement perspective, is how hard
it is to get the
At 01:39 PM 2/27/2003 -0500, R. A. Hettinga wrote:
At 9:01 AM -0500 on 2/27/03, BNA Highlights wrote:
WIRETAP ACT DOES NOT COVER MESSAGE 'IN STORAGE' FOR SHORT
PERIOD
BNA's Electronic Commerce Law Report reports that a
federal court in Massachusetts has ruled that the federal
Wiretap Act
categories that come to mind include protecting non-cryptographic
information, such as the capabilities of the communication channel. Also,
many systems on the shuttle are obsolete by modern standards, and it's
possible that the communications security is similarly aged.
- Tim Dierks
,
- Tim Dierks
[EMAIL PROTECTED]
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
At 07:30 PM 8/12/2002 +0100, Adam Back wrote:
(Tim Dierks: read the earlier posts about ring -1 to find the answer
to your question about feasibility in the case of Palladium; in the
case of TCPA your conclusions are right I think).
The addition of an additional security ring with a secured
At 09:07 PM 8/12/2002 +0100, Adam Back wrote:
At some level there has to be a trade-off between what you put in
trusted agent space and what becomes application code. If you put the
whole application in trusted agent space, while then all it's
application logic is fully protected, the danger
be many alternatives out there.
If you know of such an ASP or vendor, please send me an e-mail and I'll
summarize to the list.
Thanks,
- Tim Dierks
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography