Readers of this list may be interesting the the SRUTI -- Steps Towards
Reducing Unwanted Traffic on the Internet -- workshop. See
http://www.research.att.com/~bala/srut for details.
--Steve Bellovin, http://www.research.att.com/~smb
http://wired.com/news/technology/0,1282,65698,00.html
Shortwave radio bands, ignored by commercial broadcasters because of their low
fidelity, have long been home to government activity -- whether for national
broadcasts such as the BBC World Service, Voice of America and Radio France
Internati
Some recently declassified British documents show that the British
and the Americans did not co-operate as closely on cryptanalytic
matters as is generally thought. See
http://news.bbc.co.uk/2/hi/uk_news/3758276.stm for details.
I'd really like to see the full text of Turing's report; does anyon
What are some of the classic, must-read, references on traffic analysis?
(I'm familiar with the Zendian problem, of course.)
--Steve Bellovin, http://www.research.att.com/~smb
-
The Cryptography Mailing
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2252451747&ssPageName=ADME:B:SS:US:1
I'm sure we'll see the usual complaints about people being unable to
view it...
--Steve Bellovin, http://www.res
http://www.computerworld.com/securitytopics/security/story/0,10801,93220,00.html?from=homeheads
I'm not sure what more to say, given my opinion of the general utility
of quantum crypto
--Steve Bellovin, http://www.research.att.com
1024-bit RSA key (with MD5) in a
certificate issued by Thawte. The connection itself used 256-bit AES.
--Steve Bellovin, http://www.research.att.com/~smb
-
The Cryptography Mailing List
Unsubscribe by sending
gorithm
(i.e., 128, 192 and 256) are sufficient to protect classified
information up to the SECRET level. TOP SECRET information will
require use of either the 192 or 256 key lengths.
--Steve Bellovin, http://www.resear
Readers of this list may be interested in
http://www.si.umich.edu/spies/
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
fered by the same
party who sold the last one (#2199580460). That one went for US$ 3605.
--Steve Bellovin, http://www.research.att.com/~smb
-
The Cryptography Mailing List
Unsubscribe by sending &quo
http://edition.cnn.com/2003/TECH/internet/12/05/spam.yahoo.reut/
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
.)
--Steve Bellovin, http://www.research.att.com/~smb
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
nction, SHA-224, that is based on
SHA-256. The change notice is available at
http://csrc.nist.gov/publications/drafts.html. NIST requests comments for
the change notice by January 16, 2004. Comments should be addressed to
[EMAIL PROTECTED]
--Steve Bellovin, http://www.research.a
http://www.technologyreview.com/articles/huang1203.asp
--Steve Bellovin, http://www.research.att.com/~smb
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
[Moderator's apologies for how late this is... --Perry]
A NEMA rotor machine -- described in the listing as "based on Enigma",
but with 10 rotors -- is listed for sale on Ebay, with bids starting at
US$2390. It's item number 2199580460.
-
Some people on this list may be interested in
http://www.staff.ncl.ac.uk/d.f.j.wood/pages/thesis_index.htm
(Note: I haven't read more than Chapter 1.)
--Steve Bellovin, http://www.research.att.com/~smb
Colombian drugs cartels in the 1990s were
using massive mainframe computer systems to analyse telephone
billing records they had 'borrowed' from phone companies to find
out which people in their cartels were on the blower to Colombian
police and US agents.
17 matches
Mail list logo