CodeCon 2009 Call for Presentations

2009-01-09 Thread Len Sassaman
CodeCon 2009
April 17-19, 2009
San Francisco CA, USA
www.codecon.org

Call For Presentations

CodeCon is the premier showcase of cutting edge software development. It
is an excellent opportunity for programmers to demonstrate their work and
keep abreast of what's going on in their community.

All presentations must include working demonstrations, ideally accompanied
by source code. Presentations must be done by one of the active developers
of the code in question. We emphasize that demonstrations be of *working*
code.

We hereby solicit papers and demonstrations.

* Papers and proposals due: February 15, 2009
* All Authors notified: March 1, 2009

Possible topics include, but are by no means restricted to:

* community-based web sites - forums, weblogs, personals
* development tools - languages, debuggers, version control
* file sharing systems - swarming distribution, distributed search
* security products - mail encryption, intrusion detection, firewalls
* malware analysis - detection, compensation, and mitigation of
  emerging threats

--

As a new feature this year, CodeCon will be presenting a Biohack! track.
While we will continue our tradition of presenting only one talk at a
time, a portion of one of the days' talks will be reserved for interesting
biotechnology hacking projects. A key requirement for these presentations
is ease of reproduction with minimal access to expensive laboratory
equipment.

Example topics include:

* Purifying DNA using common household items
* Developing genetically-modified bacteria in a kitchen laboratory
* Using specially-designed software to assist in bioengineering
* The use of simple bioengineering techniques to solve real-world
  problems.

Ideal Biohack! Track submissions will have a strong emphasis on the
hack portion of the talk -- in the last few years, there has been a
strong growth in the community of biology hackers; we aim to bring these
hackers together to discuss their techniques for inexpensive, at home
experimentation in biological engineering research.

--

Presentations will be 30 minutes long, with an additional 15 minutes
allocated for QA. Overruns will be truncated.

Submission details:

Submissions are being accepted immediately. Acceptance dates are
February 7th and March 1st. After the first acceptance date, submissions
will be either accepted, rejected, or deferred to the second acceptance
date.

The conference language is English.

The conference venue is open to all ages.

Ideally, technical demonstrations should be usable by attendees with
802.11b connected devices either via a web interface, or locally on
Windows, UNIX-like, or MacOS platforms. Cross-platform applications are
most desirable. Biohacking demonstrations should be viewable with a
presenter-provided camera, or prepared movies for projection.


To submit, send mail to submissions-2...@codecon.org including the
following information:

* Project name
* Code track or Biohack! track
* url of project home page
* tagline - one sentence or less summing up what the project does
* names of presenter(s) and urls of their home pages, if they have any
* one-paragraph bios of presenters, optional, under 100 words each
* project history, under 150 words
* what makes the project novel -- how it differs from similar projects
* what will be done in the project demo, under 200 words
* slides to be shown during the presentation, if applicable
* future plans

General Chairs: Jonathan Moore and Bram Cohen
Program Chair: Jered Floyd and Len Sassaman

Program Committee:

* Jon Callas, PGP, USA
* Bram Cohen, BitTorrent, USA
* Roger Dingledine, The Tor Project, USA
* Jered Floyd, Permabit, USA
* Ben Laurie, Google, UK
* David Molnar, University of California, Berkeley, USA
* Jonathan Moore, Mosuki, USA
* Meredith L. Patterson, Osogato, USA
* Andrew S. Peek, Integrated DNA Technologies, USA
* Len Sassaman, Katholieke Universiteit Leuven, BE
* Cliff Skolnick
* Paul Syverson, Naval Research Laboratory, USA
* [Others may be added]

Sponsorship:

If your organization is interested in sponsoring CodeCon, we would love to
hear from you. In particular, we are looking for sponsors for social meals
and parties on any of the three days of the conference, as well as
sponsors of the conference as a whole and donors of door prizes. If you
might be interested in sponsoring any of these aspects, please contact the
conference organizers at codecon2...@codecon.org

Press policy:

CodeCon provides a limited number of passes to qualifying press.
Complimentary press passes will be evaluated on request. Everyone is
welcome to pay the low registration fee to attend without an official
press credential.

Questions:

If you have questions about CodeCon, or would like to contact the
organizers, please mail codecon2...@codecon.org. Please note this address
is only for questions

Re: MD5 considered harmful today

2009-01-02 Thread Len Sassaman
On Tue, 30 Dec 2008, Hal Finney wrote:

  - The attack relies on cryptographic advances in the state of the art for
finding MD5 collisions from inputs with different prefixes. These advances
are not yet being published but will presumably appear in 2009.

To insert a malicious basicConstraints CA = TRUE these advances appear
necessary; I do not believe that they are necessary for the other very
similar attack (where the malicious cert is a wildcard (*) certificate). I
could be wrong about this, but I also don't think that the advances in
cryptography to get from chosen prefix attacks to here are anywhere near
as great as were needed to get the original chosen prefix work. We can
evaluate the correctness of that statement when the work is published, of
course.

  - The collision was found using Arjen Lenstra's PlayStation Lab and used
200 PS3s with collectively 30 GB of memory. The attack is in two parts,
a new preliminary birthdaying step which is highly parallelizable and
required 18 hours on the PS3s, and a second stage which constructs the
actual collision using 3 MD5 blocks and runs on a single quad core PC,
taking 3 to 10 hours.

Prof. Lenstra's PlayStation Lab is definitely impressive, but there are
many ways to get the computation time needed to perform this attack,
including Amazon's EC2, botnets, and other high powered computing systems.
It's not *that* much computation time.

 My take on this is that because the method required advances in
 cryptography and sophisticated hardware, it is unlikely that it could
 be exploited by attackers before the publication of the method, or
 the publication of equivalent improvements by other cryptographers. If
 these CAs stop issuing MD5 certs before this time, we will be OK. Once
 a CA stops issuing MD5 certs, it cannot be used for the attack. Its old
 MD5 certs are safe and there is no danger of future successful attacks
 along these lines.  As the paper notes, changing to using random serial
 numbers may be an easier short-term fix.

I am worried that this may be too optimistic of an outlook. This attack
was known and discussed by at least two research teams for at least a year
(Dan Kaminsky, Meredith L. Patterson, and I worked out the attack at the
last CCC).

To be fully confident in the CA infrastructure, all certificates that have
delegated signing authority granted to them by a higher CA (using MD5 on
the certificate in question) should be audited to ensure they are not
malicious. This of course includes private certificate infrastructures,
too.

I would be extremely surprised if this attack had been performed prior to
the original chosen prefix work being published -- but since that time,
there has been plenty of opportunity for a malicious party to quietly
perform this attack in the wild.



--Len.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Mixmaster 3.0 released

2008-03-15 Thread Len Sassaman
Dear all,

[Apologies if you get multiple copies of this email.]

Mixmaster 3.0 has been released this week. This is the first major version
release since 2.9, and a continuation of that code, though it incorporates
numerous improvements, feature enhancements, and bug-fixes. It is
recommended that you upgrade your remailers to this version.

For those of you running 3.0rc1 or one of the 3.0 beta releases, the
changes are minor, though upgrading is still recommended.

Please report any problems you experience to the Mixmaster maintainers
through the bug tracker at SourceForge. (http://sf.net/projects/mixmaster).

The code can be found there as well, and is signed by the Mixmaster 3.x
release key, found on http://mixmaster.sf.net and signed by myself and
numerous other cypherpunks. Any questions regarding tampering with the
source code should be reported as soon as noticed.

There are some user-facing improvements as well, though most of the
planned client improvements have been pushed off to 3.1. For stability
reasons, users of the client are encouraged to upgrade as well. (Users of
third-party GUIs for Mixmaster are encouraged to report their success or
problems with detailed bug reports if applicable.)

We're looking forward to your feedback!


Best regards, on behalf of the Mixmaster Development Team:

Steve Crook
Peter Palfrader
Len Sassaman
Colin Tuckley

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: wrt Cold Boot Attacks on Disk Encryption

2008-03-15 Thread Len Sassaman
On Mon, 25 Feb 2008, Ken Buchanan wrote:

 Adam Boileau demonstrated finding passwords, but of course we already
 know that it's easy to locate cryptographic keys in large volumes of
 data (Shamir, van Someren: http://citeseer.ist.psu.edu/265947.html).

This was implemented (in part by some of my colleagues at Leuven as joint
work with Utimaco) as long ago as 2000:

KeyGrab TOO The search for keys continues
Dirk Janssens, Ronny Bjones, Joris Claessens

Citeseer seems to be offline at the moment, but if anyone's interested in
reading the paper, I believe I can give you a copy.


--Len.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: cold boot attacks on disk encryption

2008-02-21 Thread Len Sassaman
On Thu, 21 Feb 2008, Perry E. Metzger wrote:


 Ali, Saqib [EMAIL PROTECTED] writes:
  This methods requires the computer to be recently turned-on and unlocked.

 No, it just requires that the computer was recently turned on. It need
 not have been unlocked -- it jut needed to have keying material in RAM.

Indeed. Given the recent discussions of border searches of laptops, I
wouldn't be surprised to see this technique used against locked laptops in
suspended mode.

The idea that data in RAM doesn't automatically disappear the instant the
computer is powered off isn't the really interesting thing in this paper,
though, at least for me. I'm more intrigued by the error-correction
techniques they use to apparently recover AES keys that have degraded by
up to 10% of their bits.

It would be nice if the authors released their tools so that other
researchers can build on this.


--Len.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Hypothesis: PGP backdoor (was: A security bug in PGP products?)

2006-08-27 Thread Len Sassaman
On Thu, 24 Aug 2006, Ondrej Mikle wrote:

 2) AFAIK, Zimmerman is no longer in control of the company making PGP.
 AFAIK the company (NAI) has been bought by another group couple of years
 ago.

The rescue of PGP from NAI's gross neglect and mismanagement of the
product line was orchestrated by individuals involved in the original PGP,
Inc. startup, and lead by respected cryptographic engineer Jon Callas
(also known for being the editor of RFC 2440) and Phil Dunkelberger (the
original PGP, Inc., CEO.) As part of their acquisition of the PGP product
line, they hired (nearly?) the entire PGP programming team, including such
familiar faces as Will Price and Hal Finney.

http://www.pgp.com/company/management.html

As a former NAI employee who worked on the PGP products, I firmly believe
the software is in far more capable hands now from a management
standpoint. As a PGP Universal user, I'm delighted by the significant
improvements in usability that the new management has allowed the
engineering team to make. The myopia of NAI's executives toward the
usability problems in PGP was one of the reasons I quit the company in
frustration.

Also, for what it's worth, Phil was ousted from NAI in 2000, prior to the
discontinuation of NAI's commitment to the PGP product line, but he *is*
involved with the current PGP Corporation, as a member of the technical
advisory board.

http://www.pgp.com/company/boards/tab.html

I also have no question, personally, that if there's a backdoor in PGP,
neither Mr. Callas nor any of the PGP engineers I had the pleasure to work
with know of it. Your theory is indeed wild, and though I don't mean to
discourage vigilance in questioning these sorts of potential subversions
of integrity in software as important as PGP, you might consider doing
more research into the background of people against whom you choose to
levy hypothetical accusations in public forums in the future.


--Len.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


CodeCon program announced, early registration deadline nearing

2006-01-22 Thread Len Sassaman
The program for CodeCon 2006 has been announced.

http://www.codecon.org/2006/program.html

CodeCon is the premier showcase of innovative software projects. It is a
workshop for developers of real-world applications with working code and
active development projects. All presentations will given by one of the
lead developers, and accompanied by a functional demo.


Highlights of CodeCon 2006 include:

iGlance -   Open source push-to-talk videoconferencing and
screen-sharing
Monotone -  Low stress, high functionality version control
Query By Example -  Data mining operations within PostgreSQL
Djinni -Efficient approximations to NP-complete problems
Elsa/Oink/Cqual++ - A static-time whole-program dataflow analysis for C
and C++
Truman -An open-source behavioral malware analysis sandnet
VidTorrent/Peers -  A scalable real-time p2p streaming protocol


The fifth annual CodeCon takes place February 10 - 12, 11:30 - 18:00, at
StudioZ (314 11th Street) in San Francisco. Early registration is $63,
available online until February 1st, 2006.

Registration will be available at the door for $85.

Supporting Attendee tickets are also available, and include a one-year
membership to the USENIX Association. Please see the CodeCon registration
page for details:

http://www.codecon.org/2006/registration.html


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


CodeCon submission deadline reminder

2005-12-14 Thread Len Sassaman
Here's a reminder that the deadline for submissions to CodeCon 2006 is
this week. Feel free to forward this to project developers who might not
otherwise see it.

--Len.

--

CodeCon 2006
February 10-12, 2006
San Francisco CA, USA
www.codecon.org

Call For Papers

CodeCon is the premier showcase of cutting edge software development. It
is an excellent opportunity for programmers to demonstrate their work and
keep abreast of what's going on in their community.

All presentations must include working demonstrations, ideally
accompanied by source code. Presentations must be done by one of the
active developers of the code in question. We emphasize that
demonstrations be of *working* code.

We hereby solicit papers and demonstrations.

* Papers and proposals due: December 15, 2005
* Authors notified: January 1, 2006

Possible topics include, but are by no means restricted to:

* community-based web sites - forums, weblogs, personals
* development tools - languages, debuggers, version control
* file sharing systems - swarming distribution, distributed search
* security products - mail encryption, intrusion detection, firewalls

Presentations will be 45 minutes long, with 15 minutes allocated for
QA. Overruns will be truncated.

Submission details:

Submissions are being accepted immediately. Acceptance dates are
November 15, and December 15. After the first acceptance date,
submissions will be either accepted, rejected, or deferred to the
second acceptance date.

The conference language is English.

Ideally, demonstrations should be usable by attendees with 802.11b
connected devices either via a web interface, or locally on Windows,
UNIX-like, or MacOS platforms. Cross-platform applications are most
desirable.

Our venue will be 21+.

To submit, send mail to submissions-2006 at codecon.org including the
following information:

* Project name
* url of project home page
* tagline - one sentence or less summing up what the project does
* names of presenter(s) and urls of their home pages, if they have any
* one-paragraph bios of presenters, optional, under 100 words each
* project history, under 150 words
* what will be done in the project demo, under 200 words
* slides to be shown during the presentation, if applicable
* future plans

General Chair: Jonathan Moore
Program Chair: Len Sassaman

Program Committee:

* Bram Cohen, BitTorrent, USA
* Jered Floyd, Permabit, USA
* Ian Goldberg, Zero-Knowledge Systems, CA
* Dan Kaminsky, Avaya, USA
* Ben Laurie, The Bunker Secure Hosting, UK
* Nick Mathewson, The Free Haven Project, USA
* David Molnar, University of California, Berkeley, USA
* Jonathan Moore, Mosuki, USA
* Meredith L. Patterson, University of Iowa, USA
* Len Sassaman, Katholieke Universiteit Leuven, BE

Sponsorship:

If your organization is interested in sponsoring CodeCon, we would
love to hear from you. In particular, we are looking for sponsors for
social meals and parties on any of the three days of the conference,
as well as sponsors of the conference as a whole and donors of door
prizes. If you might be interested in sponsoring any of these aspects,
please contact the conference organizers at codecon-admin at codecon.org.

Press policy:

CodeCon provides a limited number of passes to qualifying press.
Complimentary press passes will be evaluated on request. Everyone is
welcome to pay the low registration fee to attend without an official
press credential.

Questions:

If you have questions about CodeCon, or would like to contact the
organizers, please mail codecon-admin at codecon.org. Please note this
address is only for questions and administrative requests, and not for
workshop presentation submissions.







-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


CodeCon Reminder

2005-02-07 Thread Len Sassaman
e'd like to remind those of you planning to attend this year's event that
CodeCon is fast approaching.

CodeCon is the premier event in 2005 for application developer community.
It is a workshop for developers of real-world applications with working
code and active development projects.

Past presentations at CodeCon have included the file distribution software
BitTorrent; the Peek-A-Booty anti-censorship application; the email
encryption system PGP Universal; and Audacity, a powerful audio editing
tool.

Some of this year's highlights include Off-The-Record Messaging, a
privacy-enhancing encryption protocol for instant-message systems;
SciTools, a web-based toolkit for genetic design and analysis; and
Incoherence, a novel stereo sound visualization tool.

CodeCon registration is discounted this year:  $80 for cash at the door
registrations. Registration will be available every day of the conference,
though ticket are limited, and attendees are encouraged to register on the
first day to secure admission.

CodeCon will be held February 11-13, noon-6pm, at Club NV (525 Howard
Street) in San Francisco.


For more information, please visit http://www.codecon.org.




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


CodeCon CFP deadline nearing

2004-12-10 Thread Len Sassaman
CodeCon 4.0
February 11-13, 2005
San Francisco CA, USA
www.codecon.org

Call For Papers

CodeCon is the premier showcase of cutting edge software development. It
is an excellent opportunity for programmers to demonstrate their work and
keep abreast of what's going on in their community.

All presentations must include working demonstrations, ideally accompanied
by source code. Presenters must be done by one of the active developers of
the code in question. We emphasize that demonstrations be of *working*
code.

We hereby solicit papers and demonstrations.

* Papers and proposals due: December 15, 2004
* Authors notified: January 1, 2005

Possible topics include, but are by no means restricted to:

* community-based web sites - forums, weblogs, personals
* development tools - languages, debuggers, version control
* file sharing systems - swarming distribution, distributed search
* security products - mail encryption, intrusion detection, firewalls

Presentations will be a 45 minutes long, with 15 minutes allocated for
QA. Overruns will be truncated.

Submission details:

Submissions are being accepted immediately. Acceptance dates are November
15, and December 15. After the first acceptance date, submissions will be
either accepted, rejected, or deferred to the second acceptance date.

The conference language is English.

Ideally, demonstrations should be usable by attendees with 802.11b
connected devices either via a web interface, or locally on Windows,
UNIX-like, or MacOS platforms. Cross-platform applications are most
desirable.

Our venue will be 21+.

To submit, send mail to [EMAIL PROTECTED] including the
following information:

* Project name
* url of project home page
* tagline - one sentence or less summing up what the project does
* names of presenter(s) and urls of their home pages, if they have any
* one-paragraph bios of presenters, optional, under 100 words each
* project history, under 150 words
* what will be done in the project demo, under 200 words
* slides to be shown during the presentation, if applicable
* future plans

General Chairs: Jonathan Moore, Len Sassaman
Program Chair: Bram Cohen

Program Committee:

* Jeremy Bornstein, AtomShockwave Corp., USA
* Bram Cohen, BitTorrent, USA
* Jered Floyd, Permabit, USA
* Ian Goldberg, Zero-Knowledge Systems, CA
* Dan Kaminsky, Avaya, USA
* Klaus Kursawe, Katholieke Universiteit Leuven, BE
* Ben Laurie, A.L. Digital Ltd., UK
* David Molnar, University of California, Berkeley, USA
* Jonathan Moore, Mosuki, USA
* Len Sassaman, Nomen Abditum Services, USA

Sponsorship:

If your organization is interested in sponsoring CodeCon, we would love to
hear from you. In particular, we are looking for sponsors for social meals
and parties on any of the three days of the conference, as well as
sponsors of the conference as a whole and donors of door prizes. If you
might be interested in sponsoring any of these aspects, please contact the
conference organizers at [EMAIL PROTECTED]

Press policy:

CodeCon provides a limited number of passes to bona fide press.
Complimentary press passes will be evaluated on request. Everyone is
welcome to pay the low registration fee to attend without an official
press credential.

Questions:

If you have questions about CodeCon, or would like to contact the
organizers, please mail [EMAIL PROTECTED] Please note this
address is only for questions and administrative requests, and not for
workshop presentation submissions.







-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


CodeCon 2005 Call for Papers

2004-10-06 Thread Len Sassaman
CodeCon 4.0
February 11-13, 2005
San Francisco CA, USA
www.codecon.org

Call For Papers

CodeCon is the premier showcase of cutting edge software development. It
is an excellent opportunity for programmers to demonstrate their work and
keep abreast of what's going on in their community.

All presentations must include working demonstrations, ideally accompanied
by source code. Presenters must be done by one of the active developers of
the code in question. We emphasize that demonstrations be of *working*
code.

We hereby solicit papers and demonstrations.

* Papers and proposals due: December 15, 2005
* Authors notified: January 1, 2005

Possible topics include, but are by no means restricted to:

* community-based web sites - forums, weblogs, personals
* development tools - languages, debuggers, version control
* file sharing systems - swarming distribution, distributed search
* security products - mail encryption, intrusion detection, firewalls

Presentations will be a 45 minutes long, with 15 minutes allocated for
QA. Overruns will be truncated.

Submission details:

Submissions are being accepted immediately. Acceptance dates are November
15, and December 15. After the first acceptance date, submissions will be
either accepted, rejected, or deferred to the second acceptance date.

The conference language is English.

Ideally, demonstrations should be usable by attendees with 802.11b
connected devices either via a web interface, or locally on Windows,
UNIX-like, or MacOS platforms. Cross-platform applications are most
desirable.

Our venue will be 21+.

To submit, send mail to [EMAIL PROTECTED] including the
following information:

* Project name
* url of project home page
* tagline - one sentence or less summing up what the project does
* names of presenter(s) and urls of their home pages, if they have any
* one-paragraph bios of presenters, optional, under 100 words each
* project history, under 150 words
* what will be done in the project demo, under 200 words
* slides to be shown during the presentation, if applicable
* future plans

General Chairs: Jonathan Moore, Len Sassaman
Program Chair: Bram Cohen

Program Committee:

* Jeremy Bornstein, AtomShockwave Corp., USA
* Bram Cohen, BitTorrent, USA
* Jered Floyd, Permabit, USA
* Ian Goldberg, Zero-Knowledge Systems, CA
* Dan Kaminsky, Avaya, USA
* Klaus Kursawe, Katholieke Universiteit Leuven, BE
* Ben Laurie, A.L. Digital Ltd., UK
* David Molnar, University of California, Berkeley, USA
* Jonathan Moore, Mosuki, USA
* Len Sassaman, Nomen Abditum Services, USA

Sponsorship:

If your organization is interested in sponsoring CodeCon, we would love to
hear from you. In particular, we are looking for sponsors for social meals
and parties on any of the three days of the conference, as well as
sponsors of the conference as a whole and donors of door prizes. If you
might be interested in sponsoring any of these aspects, please contact the
conference organizers at [EMAIL PROTECTED]

Press policy:

CodeCon provides a limited number of passes to bona fide press.
Complimentary press passes will be evaluated on request. Everyone is
welcome to pay the low registration fee to attend without an official
press credential.

Questions:

If you have questions about CodeCon, or would like to contact the
organizers, please mail [EMAIL PROTECTED] Please note this
address is only for questions and administrative requests, and not for
workshop presentation submissions.







-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Approximate hashes

2004-09-06 Thread Len Sassaman
On Wed, 1 Sep 2004, Marcel Popescu wrote:

 Hence my question: is there some approximate hash function (which I could
 use instead of SHA-1) which can verify that a text hashes very close to a
 value? So that if I change, say, tabs into spaces, I won't get exactly the
 same value, but I would get a good enough?

Hi Marcel,

You may wish to look at Cmeclax's nilsimsa. It has been used to detect
slightly-modified message floods in anonymous remailer systems, and was
also used in Spamassassin at some point.

http://lexx.shinn.net/cmeclax/nilsimsa.html



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Mixmaster Protocol Draft (revision)

2004-05-25 Thread Len Sassaman
An updated version of the Mixmaster Protocol Specification has been
published:

http://www.ietf.org/internet-drafts/draft-sassaman-mixmaster-01.txt

I'd like this to be the last revision, so if you have any comments on it
(or if you've raised issues in the past that you don't see addressed),
please let me know. Comment should be emailed to:

[EMAIL PROTECTED]


Thanks,

Len


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Mixmaster RFC

2004-04-05 Thread Len Sassaman
Hello,

I'm preparing to submit draft -02 of the revised Mixmaster Protocol  
Specification. If you have any comments, or have previously contributed  
and have not been acknowledged, please let me know as soon as possible  
by sending mail to  [EMAIL PROTECTED]

The last published version is here:

http://www.ietf.org/internet-drafts/draft-sassaman-mixmaster-00.txt

The current working version of the I-D is here:

https://source.mixmaster.anonymizer.com/svn/mixmaster/trunk/Docs/draft- 
sassaman-mixmaster-XX.txt

(Please comment on the latter).

Thanks,

Len

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


CodeCon Call for Papers

2003-11-13 Thread Len Sassaman
CodeCon 3.0
February 20-22, 2004
San Francisco CA, USA
www.codecon.org

Call For Papers

CodeCon is the premier showcase of active hacker projects. It is an
excellent opportunity for developers to demonstrate their work and keep
abreast of what's going on in their communities.

All presentations must include working demonstrations, ideally open
source. Presenters must be one of the active developers of the code in
question. We emphasize that demonstrations be of *working* code.

CodeCon strongly encourages presenters from non-commercial and academic
backgrounds to attend for the purposes of collaboration and the sharing of
knowledge by providing free registration to workshop presenters and
discounted registration to full-time students.

We hereby solicit papers and demonstrations.


Papers and proposals due: December 15, 2003

Authors notified: January 1, 2004

Possible topics include, but are by no means restricted to:

  community-based web sites - forums, weblogs, personals
  development tools - languages, debuggers, version control
  file sharing systems - swarming distribution, distributed search
  security products - mail encryption, intrusion detection, firewalls

Presentations will be a 45 minutes long, with 15 minutes allocated for
QA. Overruns will be truncated.


Submission details:

Submissions are being accepted immediately. Acceptance dates are November
15 and December 15. After the first acceptance date, submissions will be
either accepted, rejected, or deferred to the second acceptance date.

The conference language is English.

Ideally, demonstrations should be usable by attendees with 802.11b
connected devices either via a web interface, or locally on Windows,
UNIX-like, or MacOS platforms. Cross-platform applications are most
desirable.

Our venue will be 21+.

If you have a specific day on which you would prefer to present, please
advise us.

To submit, send mail to [EMAIL PROTECTED] including the following
information:


Project name

url of project home page

tagline - one sentence or less summing up what the project does

names of presenter(s) and urls of their home pages, if they have any

one-paragraph bios of presenters (optional)

project history, no more than a few sentences

what will be done in the project demo

major achievement(s) so far

claim(s) to fame, if any

future plans


Program Chair: Bram Cohen
General Chair: Len Sassaman

Program Committee:

Jeremy Bornstein, Perpetual Entertainment
Bram Cohen, Valve
Jered Floyd, Permabit
Len Sassaman, Anonymizer
Jonathan Moore
Brandon Wiley, Foundation for Decentralization Research


Sponsorship:

If your organization is interested in sponsoring CodeCon, we would love to
hear from you. In particular, we are looking for sponsors for social meals
and parties on any of the three days of the conference, as well as
sponsors of the conference as a whole, prizes or awards for quality
presentations, scholarships for qualified applicants, and assistance with
transportation or accommodation for presenters with limited resources. If
you might be interested in sponsoring any of these aspects, please contact
the conference organizers at [EMAIL PROTECTED]


Press policy:

CodeCon strives to be a conference for developers, with strong audience
participation. As such, we need to limit the number of complimentary
passes for non-developer attendees. Press passes are limited to one pass
per publication, and must be approved prior to the registration deadline
(to be announced later). If you are a member of the press, and interested
in covering CodeCon, please contact us early by sending email to
[EMAIL PROTECTED] Members of the press who do not receive press-passes
are welcome to participate as regular conference attendees. Questions:

If you have questions about CodeCon, or would like to contact the
organizers, please mail [EMAIL PROTECTED] Please note this
address is only for questions and administrative requests, and not for
workshop presentation submissions.








-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]