Ben Laurie [EMAIL PROTECTED] writes:
Peter Gutmann wrote:
Given the string of
attacks on crypto in embedded devices (XBox, iPhone, iOpener, Wii, some
not-yet-published ones on HDCP devices :-), etc) this is by far the most
at-risk category because there's a huge incentive to attack them, the
Peter Gutmann wrote:
Ben Laurie [EMAIL PROTECTED] writes:
Peter Gutmann wrote:
Given the string of
attacks on crypto in embedded devices (XBox, iPhone, iOpener, Wii, some
not-yet-published ones on HDCP devices :-), etc) this is by far the most
at-risk category because there's a huge
Eugen Leitl and Stephan Somogyi [EMAIL PROTECTED] wrote
about the Skein hash function announcement.
http://www.schneier.com/blog/archives/2008/10/the_skein_hash.html?1
http://www.schneier.com/skein.html
One thing I noticed on a first read-through was
a discussion of speed for ASICs vs.
On Wed, Oct 29, 2008 at 9:23 AM, Stephan Somogyi wrote:
The Skein team has announced its submission to the NIST hash competition:
http://www.schneier.com/skein.html
Now that we've all had a chance to read the Skein algorithm, I've got
a question for the list:
Would it be possible to
It seems that Donald Knuth had his bank accounts attacked not once but
three times using his checking account number off of checks he sent
out for bounties for flaws in his books and software, and is thus
ending a practice of nearly 40 years. Rather sad.
I mark this as another milestone in the