Brian Gladman wrote:
But a fully byte oriented implementation runs at about 140 cycles/byte
and here the S-Box substitution step is a significant bottleneck.
...
It is also possible that the PPERM instruction could be used to speed up
the Galois field calculations to produce the S-Box
Allen [EMAIL PROTECTED] wrote:
Agreed, but..., well there is the small matter of figuring out /who/ is
doing it and that just might require some small bit of technology.
Certainly, it is not mutual exclusive. However factor an RSA key
hardly can help with that.
At least two defects in this
Leichter, Jerry [EMAIL PROTECTED] wrote:
Computerworld reports:
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818
on a call from Kaspersky Labs for help breaking encryption used by some
ransomeware: Code that infects a system, uses a public key
On Fri, Apr 25, 2008 at 12:22 AM, Steven M. Bellovin
[EMAIL PROTECTED] wrote:
http://www.nsa.gov/public/crypt_spectrum.cfm
I know this is silly but I could not resist to comment on some NSA redacts:
http://www.literatecode.com/2008/04/29/nsaredact/
Ilya
just better be named rubbish without
any metaphorical allusions. For everyone's good.
--
Ilya Levin
http://www.literatecode.com
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
John Denker [EMAIL PROTECTED] wrote:
So, unless/until somebody comes up with a better metaphor,
I'd vote for one-picket fence.
Nonsense fence maybe less metaphoric but more clear.
-- -
Ilya O Levin
http://www.literatecode.com