With regards to alternative runtime decryptions, recall ...
http://people.csail.mit.edu/rivest/Chaffing.txt
The claim is that the approach is neither encryption nor steganography.
Cheers, Scott
-
The Cryptography Mailing List
Is it possible that the amount of information that the knowledge of a
sub-threshold number of Shamir fragments leaks in finite precision setting
depends on the finite precision implementation?
For example, if you know 2 of a 3 of 5 splitting and you also know that
the finite precision setting in
However, a cert seems almost certainly *not* to be IP.
If anybody can alter, revoke or reissue a certificate then I agree it is
common property to which attaches no meaningful notion of property rights.
If on the other hand only certain people can alter, revoke or reissue a
certificate then it
How much security can you put into a plastic card, the size of a
credit card, that has to perform its function in a secure manner, all
in under 2 seconds (in under 1 second in parts of Asia)? And it has to
do this while receiving its power via the electromagnetic field being
generated by the