[resending this, after it didn't reach the list first time. I seem to have
fallen off the list, and am back on now. I hope this isn't a repeat. /udhay]
http://aolsvc.news.aol.com/news/article.adp?id=20050721170009990017
Last WWII Comanche "code talker" dies in Oklahoma
By Ben Fenwick, Reuters
Hi all,
I don't know if this is appropriate on this list, but I know that
diebold voting systems have been an issue in the cryptography community
for a while now. Having said that, I'm pasting an article that I
received (from my parents actually) that might be of interest to this
group. If it
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Wed, 27 Jul 2005 22:57:32 -0400
To: "Philodox Clips List" <[EMAIL PROTECTED]>
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
Subject: [Clips] All your routers are belong to us
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Guys,
I have what seems like a new and interesting result, which I
haven't seen before, but which may or may not be new.
The high order bit is that you can't generally guarantee
that truncating your hash (chopping off some bits) won't
weaken it. That is, if you chop SHA256 off to 160 bits as a
--- begin forwarded text
Date: Wed, 27 Jul 2005 08:12:53 -0400
To: "Philodox Clips List" <[EMAIL PROTECTED]>
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
Subject: Privacy Guru Locks Down VOIP
--- begin forwarded text
Date: Wed, 27 Jul 2005 12:44:43 +0200
From: Eugen Leitl <[EMAIL PROT