hen a CUDA graphics adapter is available."
https://dedected.org/trac/raw-attachment/wiki/DSC-Analysis/FSE2010-166.pdf
This is from FSE 2010 in February, but I hadn't seen it mentioned here
yet.
--
Dustin D. Trammell
Security Researcher
BreakingPoint Systems, Inc.
signature.asc
Descr
-49DB-A98B-0CED7CB8FF6F
--
Dustin D. Trammell
Security Researcher
BreakingPoint Systems, Inc.
signature.asc
Description: This is a digitally signed message part
e the
boomerang attack can be used with maximum effect.
Paper will appear on eprint soon."
http://ping.fm/uCVUM
--
Dustin D. Trammell
Security Researcher
BreakingPoint Systems, Inc.
signature.asc
Description: This is a digitally signed message part
t moving directly to at least SHA-2 (until the winner of the NIST
hash competition is known), these vendors are likely setting themselves
up for similar attacks in the (relatively) near future.
[1] http://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html
[2] http://www.cryptography.com/cnews/
On Tue, 2008-08-26 at 13:22 -0400, Ken Buchanan wrote:
> On Tue, Aug 26, 2008 at 11:56 AM, Dustin D. Trammell
> <[EMAIL PROTECTED]> wrote:
> > This is the same for the state-wide Texas tag, TxTag[1]. If your tag
> > doesn't register, or you disable or remove
ate and vehicle
registration. If you're not in the TxTag system at all, they simply
mail you a bill.
[1] http://www.txtag.org/
--
Dustin D. Trammell
Security Researcher
BreakingPoint Systems, Inc.
signature.asc
Description: This is a digitally signed message part
est-TheMD6HashFunction.ppt
--
Dustin D. Trammell
Security Researcher
BreakingPoint Systems, Inc.
signature.asc
Description: This is a digitally signed message part
cis/theses/crutchfield-masters-thesis.pdf
It's titled 'Security Proofs for the MD6 Hash Function Mode of
Operation' by Christopher Yale Crutchfield (certified by Ronald L.
Rivest). I thought it might be of interest to the followers of this
thread.
--
Dustin D. Trammell
Security R
Also from the NewScientist article that I just posted, another paper
from completely different researchers arriving at the same result:
http://arxiv.org/pdf/0705.1398
--
Dustin D. Trammell
Product Security Analyst
TippingPoint, a division of 3Com
signature.asc
Description: This is a digitally
NewScientist's write-up (subscription required for full article):
http://technology.newscientist.com/article.ns?id=mg19526216.700
You can find the full paper here:
http://arxiv.org/pdf/0705.1684
--
Dustin D. Trammell
Product Security Analyst
TippingPoint, a division of 3Com
signatur
10 matches
Mail list logo