From: Sara Caswell [EMAIL PROTECTED]
To: undisclosed-recipients:;
Subject: NIST Special Publication 800-108 Recommendation for Key
Derivation Using Pseudorandom Functions
Date: Fri, 07 Nov 2008 08:57:40-0500
Dear Colleagues:
NIST Special Publication 800-108 Recommendation for Key Derivation
Hey folks: you are welcome to discuss money politics over at the p2p-
hackers mailing list:
http://lists.zooko.com/mailman/listinfo/p2p-hackers
I'm extremely interested in the subject myself, having taken part in
two notable failed attempts to deploy Chaumian digital cash and
currently
Bitcoin seems to be a very promising idea. I like the idea of basing
security on the assumption that the CPU power of honest participants
outweighs that of the attacker. It is a very modern notion that exploits
the power of the long tail. When Wikipedia started I never thought it
would work, but
From the DailyWTF:
In my previous alert, I included the text of a phishing email as an example
[of phishing emails that people shouldn't reply to]. Some students
misunderstood that I was asking for user name and password, and replied with
that information. Please be aware that you
[EMAIL PROTECTED] (Peter Gutmann) writes:
From the DailyWTF:
In my previous alert, I included the text of a phishing email as an example
[of phishing emails that people shouldn't reply to]. Some students
misunderstood that I was asking for user name and password, and replied with
Ray Dillinger:
the currency is inflationary at about 35%
as that's how much faster computers get annually
... the inflation rate of 35% is almost guaranteed
by the technology
Increasing hardware speed is handled: To compensate for increasing hardware
speed and varying interest in running