On Mon, Sep 03, 2007 at 04:27:22PM -0400, Vin McLellan wrote:
Thor Lancelot quoted that, and erupted with sanctimonious umbrage:
I think it's important that we know, when flaws in commercial
cryptographic products are being discussed, what the interests of the
parties to the discussion are.
I apologize for misstating your name, Mr. Simon.
I thought I had answered your question. No one asked me to reply to
Ruptor, or to you -- and you chose the tone of this exchange. As I
said, I would be shocked if anyone at RSA or EMC even knows about
this discussion.
No one tells me what
I am all for humor... Can you give us a hand with how to find this
patent?
On Sep 2, 2007, at 2:27 PM, Axel Horns wrote:
On Fri, August 31, 2007 18:54, Stephan Neuhaus wrote:
Fun,
See German patent document DE10027974A1 (application was refused
in
2006).
Axel H. Horns
but
without any DRM clutter.
Axel H. Horns
Original-Nachricht
Datum: Sun, 2 Sep 2007 21:10:14 -0700
Von: james hughes [EMAIL PROTECTED]
An: Axel Horns [EMAIL PROTECTED]
CC: james hughes [EMAIL PROTECTED], cryptography@metzdowd.com
Betreff: Re: debunking snake oil
I am
Am Donnerstag, den 30.08.2007, 20:43 -0500 schrieb travis
[EMAIL PROTECTED]:
If you have a break of some scheme you wish to contribute, please
do forward me a URL and I'll link to it.
Sorry, german, but definitely worth reading:
http://www.kryptochef.de/
signature.asc
Description: Dies ist
On Sat, Sep 01, 2007 at 02:39:49PM +0200, Marcos el Ruptor wrote:
You can start with RSA SecurID, Texas Instruments DST40, Microchip
Technologies KeeLoq, Philips/NXP Hitag2, WEP RC4, Bluetooth E0, GSM A5...
I didn't realise the current SecurID tokens had been broken. A quick Google
doesn't
I didn't realise the current SecurID tokens had been broken. A
quick Google
doesn't show anything, but I'm probably using the wrong terms. Do
you have
references for this that I could have a look at?
http://eprint.iacr.org/2003/162.pdf
This attack may not be as practical as an algebraic
On Fri, August 31, 2007 18:54, Stephan Neuhaus wrote:
Fun,
See German patent document DE10027974A1 (application was refused in
2006).
Axel H. Horns
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe
On Sun, Sep 02, 2007 at 06:26:33PM -0400, Vin McLellan wrote:
At 12:40 PM 9/2/2007, Paul Walker wrote:
I didn't realise the current SecurID tokens had been broken. A quick Google
doesn't show anything, but I'm probably using the wrong terms. Do you have
references for this that I could have
On 31 August 2007 02:44, travis+ml-cryptography wrote:
I think it might be fun to start up a collection of snake oil
cryptographic methods and cryptanalytic attacks against them.
I was going to post about crypto done wrong after reading this item[*]:
I'd like to start with the really simple stuff; classical
cryptography, systems with clean and obvious breaks.
You can start with RSA SecurID, Texas Instruments DST40, Microchip
Technologies KeeLoq, Philips/NXP Hitag2, WEP RC4, Bluetooth E0, GSM
A5... It's much harder to find a product or
Crossroads is an undergraduate journal.
We'd do well to single out more worth targets for public ridicule
than CS undergrads.
If you want to help the author, why not educate, rather than
mocking? He's obviously been motivated to think about the subject
matter and to even take the bold
I don't think fingerprint scanners work in a way that's obviously
amenable to hashing with well-known algorithms. Fingerprint scanners
produce an image, from which some features can be identified. But, not
all the same features can be extracted identically every time an image
is obtained. I know
On 02 September 2007 01:13, Nash Foster wrote:
I don't think fingerprint scanners work in a way that's obviously
amenable to hashing with well-known algorithms. Fingerprint scanners
produce an image, from which some features can be identified. But, not
all the same features can be extracted
14 matches
Mail list logo