the skein hash function

2008-10-29 Thread Eugen Leitl
http://www.schneier.com/blog/archives/2008/10/the_skein_hash.html?1 October 29, 2008 The Skein Hash Function NIST is holding a competition to replace the SHA family of hash functions, which have been increasingly under attack. (I wrote about an early NIST hash workshop here.) Skein is our subm

Skein announced

2008-10-29 Thread Stephan Somogyi
The Skein team has announced its submission to the NIST hash competition: s. - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: combining entropy

2008-10-29 Thread Bill Stewart
This isn't enough. Somehow, you have to state that the values emitted on demand in any given round i (where a round consists of exactly one demand on all N member and produces a single output result) cannot receive any input from any other members. Otherwise, if N=2 and member 0 produces true

Re: combining entropy

2008-10-29 Thread Ben Laurie
On Tue, Oct 28, 2008 at 7:55 PM, Leichter, Jerry <[EMAIL PROTECTED]> wrote: >2. The Byzantine model. Failed modules can do anything >including cooperating by exchanging arbitrary >information and doing infinite computation. So in the Byzantine model I can