<http://www.telegram.com/apps/pbcs.dll/article?Date=20040914&Category=APA&ArtNo=409141037&SectionCat=&Template=printart>
Article published Sep 14, 2004
No Paper for Md. Anti-Touchscreen Voters
By TOM STUCKEY
Associated Press Writer
Maryland's highest court T
On Tue, Sep 14, 2004 at 10:31:11AM +0200, Eugen Leitl wrote:
>
> I'm looking for (cheap, PCI/USB) hardware to store secrets (private
> key) and support crypto primitives (signing, cert generation). It
> doesn't have to be fast, but to support loading/copying of secrets
> in physically secure envir
(everybody is on the mailing list; why all the CC's?)
Adam Back writes:
> Will it be enough -- we don't know yet, but if widely deployed it
> would make spammers adapt. We just don't yet know how they will
> adapt.
Cryptography is not about math; it's not about secrets; it's not about
securit
>From: Adam Back <[EMAIL PROTECTED]>
>Sent: Sep 13, 2004 4:43 PM
>To: Adam Shostack <[EMAIL PROTECTED]>
>Cc: Ben Laurie <[EMAIL PROTECTED]>, bear <[EMAIL PROTECTED]>,
> Hadmut Danisch <[EMAIL PROTECTED]>,
> "R. A. Hettinga" <[EMAIL PROTECTED]>, [EMAIL PROTECTED],
> Eric Johanss
On Mon, Sep 13, 2004 at 02:41:21PM -0400, Sam Hartman wrote:
>
> >> No. opportunistic encryption means I have retrieved a key or
> >> cert for the other party, but do not know whether it is
> >> actually the right cert.
>
> Tim> If the key is retrieved from the other end of a TCP
I'm looking for (cheap, PCI/USB) hardware to store secrets (private key) and
support crypto primitives (signing, cert generation). It doesn't have to be
fast, but to support loading/copying of secrets in physically secure environments, and
not generate nonextractable secret onboard. Environment is
Damien O'Rourke wrote:
Hi,
I have some AES code here in C and I am trying to find it's author and
source. I can't find
it on the Internet so I figure it was taken from a book. Now I don't want
to send the entire
code to the list for obvious reasons however I was hoping you could help me
from the