Aloha!
Joachim Strömbergson skrev:
Aloha!
I just saw om EE Times that AMD will start to extend their x86 CPUs with
instructions to support/help developers take advantage of the increasing
(potential) parallelism in their processors. First out are two
instructions that allows the developer to
Have a look at
http://boinc.iaik.tugraz.at/sha1_coll_search
Aram Perez wrote:
Anyone know more about this?
--
Mads Rasmussen
LEA - Laboratório de Ensaios e Auditoria
ICP-Brasil
(Brazilian PKI Cryptographic Certification Laboratory)
Office: +55 11 4208 3873
Mobile: +55 11 9407 4493
Mobile
At 11:00 PM -0700 8/13/07, Aram Perez wrote:
Anyone know more about this?
I have the same question. I could not find any description of *why*
they think that finding near-misses is going to help the research.
It's not clear if they are taking their own path, or trying to
improve Wang's path,
http://www.radaronline.com/from-the-magazine/2007/08/cryptome_john_young_radar_anthony_haden_guest_1.php
--Steve Bellovin, http://www.cs.columbia.edu/~smb
-
The Cryptography Mailing List
Unsubscribe by sending "u
Aloha!
I just saw om EE Times that AMD will start to extend their x86 CPUs with
instructions to support/help developers take advantage of the increasing
(potential) parallelism in their processors. First out are two
instructions that allows the developer to get info about instruction
completi
It seems that a large chunk (and probably relative soon nearly all) voice
is now via VoIP.
And to date, Skype not withstanding, this has all been cleartext
traffic. Using router
netflow records, etc., one can now pinpoint any phone conversation and then
do a pcap
dump. Many Tier 1 through Tier
Anyone know more about this?
Begin forwarded message:
From: "Steven W. Teppler"
Date: August 13, 2007 4:41:56 PM PDT
To: [EMAIL PROTECTED]
Subject: Potential SHA 1 Hack Using Distributed Computing - Near
Miss(es) May be Good Enough
From DarkReading, via Heise Security:
Cracking SHA-1 usin