Here is the blind DSA signature based on MacKenzie and Reiter,
http://www.ece.cmu.edu/~reiter/papers/2001/CRYPTO.pdf, in graphical form.
Recall that a DSA public key is p, q, g, y; private key x; signature on
hash h is:
Choose k q
r = g^k mod p mod q
s = rx/k + h/k mod q
Output (r,s)
Here is
http://www.oaklandtribune.com/cda/article/print/0,1674,82%257E1865%257E2095811,00.html
Oakland Tribune
Diebold knew of legal risks
Attorneys warned firm that use of uncertified vote-counting software
violated state law
By Ian Hoffman
STAFF WRITER
Tuesday, April 20, 2004 - Attorneys for
--- begin forwarded text
Subject: Is there a Brands certificate reference implementation?
From: Steve Furlong [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Date: 25 Apr 2004 12:14:30 -0400
Sender: [EMAIL PROTECTED]
Does anyone know of a reference implementation for Stefan Brands's
Ivan Krstic wrote:
I have to agree with Perry on this one: I simply can't see a compelling
reason for the push currently being given to ridiculously overpriced
implementations of what started off as a lab toy, and what offers - in
all seriousness - almost no practical benefits over the proper
http://www.hinduonnet.com/thehindu/thscrip/print.pl?file=2004042600110200.htmdate=2004/04/26/prd=ew;
snip...
Cracking secrets
A WHOLE book of secrets is what S.C. Coutinho gives in The Mathematics of
Ciphers, published by Universities Press (www.orientlongman.com) . A
leisurely journey,
http://www.infoshop.org/inews/stories.php?story=04/04/25/8454965
Infoshop News -
How to WASTE and want not
posted by j1o2n3a4s5 on Sunday April 25 2004 @ 05:14PM PDT
WASTE would have to be pretty close to what you'd come up with.
WASTE provides a way for you to create secure ad hoc p2p
Hello folks,
I am doing a presentation on the future of security,
which of course includes a component on cryptography.
That will be given at this conference on payments
systems and security: http://www.enhyper.com/paysec/
Would anyone there have any good predictions on how
cryptography is going
R. A. Hettinga wrote:
http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=38038
WorldNetDaily
Wednesday, April 14, 2004
YOUR PAPERS, PLEASE ...
Paying for drinks with wave
of the hand
Club-goers in Spain get implanted chips for ID, payment purposes
Posted: April 14, 2004
5:00 p.m.
http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=SVBIZINK3.storySTORY=/www/story/04-27-2004/0002160357EDATE=TUE+Apr+27+2004,+07:08+AM
Silicon Valley Biz Ink :: The voice of the valley economy
April 27, 2004
Computers/Electronics News
Press release distributed
by PR Newswire
Duelling crypto-crack press-releases this morning.
Ford vs. GM, er, Certicom vs. RSA...
Cheers,
RAH
---
http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=SVBIZINK3.storySTORY=/www/story/04-27-2004/0002160593EDATE=TUE+Apr+27+2004,+09:00+AM
Silicon Valley Biz Ink :: The voice of the valley
--- begin forwarded text
Date: Tue, 27 Apr 2004 12:33:54 -0400
From: Declan McCullagh [EMAIL PROTECTED]
User-Agent: Mozilla Thunderbird 0.5 (Macintosh/20040208)
To: [EMAIL PROTECTED]
Subject: [Politech] A criticism of Gmail and a call for encryption
everywhere [priv]
List-Id: Declan
Is something known about the details of the crypto protocol within
Skype? How reliable is the encryption?
See e.g.
http://www.financialcryptography.com/mt/archives/76.html
Can Skype be wiretapped by the authorities? With collaboration of the
Skype operator? Without?
Axel H Horns
http://www.ascribe.org/cgi-bin/spew4th.pl?ascribeid=20040427.130050time=15%2000%20PDTyear=2004public=1
Tue Apr 27 15:00:10 2004 Pacific Time
UC San Diego Engineering Professor Wins Guggenheim Fellowship
SAN DIEGO, Calif., April 27 (AScribe Newswire) -- A computer
scientist and
*
DIMACS Workshop on Security Analysis of Protocols
June 7 - 9, 2004
DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ
Organizers:
John Mitchell, Stanford, [EMAIL PROTECTED]
Ran Canetti, IBM Watson, [EMAIL
14 matches
Mail list logo