Demonstration of Shor’s quantum factoring algorithm using photonic qubits

2007-09-13 Thread Dustin D. Trammell
NewScientist's write-up (subscription required for full article): http://technology.newscientist.com/article.ns?id=mg19526216.700 You can find the full paper here: http://arxiv.org/pdf/0705.1684 -- Dustin D. Trammell Product Security Analyst TippingPoint, a division of 3Com signature.asc

Experimental demonstration of Shor’s algorithm with quantum entanglement

2007-09-13 Thread Dustin D. Trammell
Also from the NewScientist article that I just posted, another paper from completely different researchers arriving at the same result: http://arxiv.org/pdf/0705.1398 -- Dustin D. Trammell Product Security Analyst TippingPoint, a division of 3Com signature.asc Description: This is a digitally

Re: The MD6 hash function (rough notes)

2008-08-22 Thread Dustin D. Trammell
Function Mode of Operation' by Christopher Yale Crutchfield (certified by Ronald L. Rivest). I thought it might be of interest to the followers of this thread. -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part

Re: The MD6 hash function (rough notes)

2008-08-22 Thread Dustin D. Trammell
-- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part

Re: road toll transponder hacked

2008-08-26 Thread Dustin D. Trammell
a bill. [1] http://www.txtag.org/ -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part

Re: road toll transponder hacked

2008-08-26 Thread Dustin D. Trammell
On Tue, 2008-08-26 at 13:22 -0400, Ken Buchanan wrote: On Tue, Aug 26, 2008 at 11:56 AM, Dustin D. Trammell [EMAIL PROTECTED] wrote: This is the same for the state-wide Texas tag, TxTag[1]. If your tag doesn't register, or you disable or remove it, the toll system can still accurately

MD5 considered harmful today, SHA-1 considered harmful tomorrow

2009-01-09 Thread Dustin D. Trammell
the winner of the NIST hash competition is known), these vendors are likely setting themselves up for similar attacks in the (relatively) near future. [1] http://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html [2] http://www.cryptography.com/cnews/hash.html -- Dustin D. Trammell Security

SHA-1 collisions now 2^52

2009-04-30 Thread Dustin D. Trammell
the boomerang attack can be used with maximum effect. Paper will appear on eprint soon. http://ping.fm/uCVUM -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part

Microsoft Windows Cryptographic Next Generation SDK 2.0 Released

2009-04-30 Thread Dustin D. Trammell
-0CED7CB8FF6F -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part