Re: RPOW - Reusable Proofs of Work

2004-08-20 Thread Hal Finney
Bear writes: I'm wondering how applicable RPOW is. Generally speaking, all the practical applications I can think of for a proof-of-work are defeated if proofs-of-work are storable, transferable, or reusable. Once they're storable, tranferable, and reusable, aren't we restricted to

[Publicity-list] DIMACS Workshop on Mobile and Wireless Security

2004-08-20 Thread Linda Casals
* DIMACS Workshop on Mobile and Wireless Security November 3 - 4, 2004 DIMACS Center, Rutgers University, Piscataway, NJ Organizers: Bill Arbaugh, University of Maryland, [EMAIL PROTECTED] Presented under

Re: HMAC?

2004-08-20 Thread Hal Finney
More on the question of HMAC. As mentioned before, the potential attack would be to find a collision on the inner hash, even without knowing the key. Since the key is exactly one hash block in length, the effect is identical to finding a hash collision without knowing the IV. Discussing this

Re: RPOW - Reusable Proofs of Work

2004-08-20 Thread Matt Crawford
I'm wondering how applicable RPOW is. Generally speaking, all the practical applications I can think of for a proof-of-work are defeated if proofs-of-work are storable, transferable, or reusable. I have some code to play online games with cryptographic protection, cards and dice, and I am