Re: New result in predicate encryption: disjunction support

2008-05-06 Thread Ariel Waissbein
Jonathan Katz wrote: On Mon, 5 May 2008, Ariel Waissbein wrote: [Moderator's note: Again, top posting is discouraged, and not editing quoted material is also discouraged. --Perry] Hi list, Interesting. Great work! I had been looking *generic* predicate encryption for some time

Re: New result in predicate encryption: disjunction support

2008-05-05 Thread Ariel Waissbein
algorithms and require assuming only the existence of IND-CPA secure symmetric ciphers. In [2] we came up with more applications other than sofprot;) [1] Diego Bendersky, Ariel Futoransky, Luciano Notarfrancesco, Carlos Sarraute and Ariel Waissbein. Advanced Software Protection Now. Core Security

WEP's dead-er: The Final Nail in WEP’s Coff in

2006-08-20 Thread Ariel Waissbein
present an attack that allows you to send arbitrary data on a WEP network after having eavesdropped a single data packet!! Next, communicate with every host in the router's LAN. And finally decrypt packets in real-time. Ariel -- Ariel Waissbein CORE SECURITY TECHNOLOGIES http://www.coresecurity.com

Re: Solving systems of multivariate polynomials modulo 2^32

2006-08-14 Thread Ariel Waissbein
- The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED] -- Ariel Waissbein RESEARCHER CORE SECURITY TECHNOLOGIES Tel./Fax: (54-11) 5556-2673 Humboldt 1967, 2do piso Capital Federal, Argentina http

Re: [IP] more on Can you be compelled to give a password?

2006-08-07 Thread Ariel Waissbein
Hi, Please notice that a second distress password becomes useless if the would-be user of this password has access to the binaries (that is, the encrypted data), e.g., because he will copy them before inserting the password and might even try to reverse-engineer the decryption software before

Re: MD5 trick

2006-04-19 Thread Ariel Waissbein
and checksum16. Regards, Ariel vlastimil.klima wrote: The trick could be shortly expressed as follows: Give me three files and I will give you another three with the same MD5 hash -- Ariel Waissbein RESEARCHER CORE SECURITY TECHNOLOGIES http://www.coresecurity.com/corelabs

Re: solving, simplification and factorization of boolean equations

2005-11-18 Thread Ariel Waissbein
Fischer ``The Thought Gang Ariel Waissbein RESEARCHER CORE SECURITY TECHNOLOGIES http://www.coresecurity.com/corelabs - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Cryptography Research wants piracy speed bump on HD DVDs

2005-01-04 Thread Ariel Waissbein
Is there really that much space for marking? Any substantial number of marked bits will become obvious in the output stream, no? Is the watermarking system robust? Is it public? And how long ago has it been published? If they are only modifying some bits (in the standard representation), then