Bill Frantz wrote:
At 6:16 PM -0800 4/2/03, Seth David Schoen wrote:
Bill Frantz writes:
The http://cryptome.org/usage-logs.htm URL says:
Low resolution data in most cases is intended to be sufficient for
marketing analyses. It may take the form of IP addresses that have been
subjected to a
Remember I asked some time ago about a review for Samuel Wagstaff's
recent book on cryptanalysis of number theoretic ciphers?
I still haven't found any, but I wrote to Samuel to ask him if he knew
if any existed.
Below I have, with his permission, copied his answer.
Regards,
Mads
Arnold G. Reinhold [EMAIL PROTECTED] wrote:
The Army actually has a training course (from 1990) on-line that
describes such a system in detail. The cipher system, called DRYAD is
covered in
https://hosta.atsc.eustis.army.mil/cgi-bin/atdl.dll/accp/is1100/ch4.htm
.
Your description fits, it
NIST received several thoughtful public comments on the draft NIST Special
Publication 800-38B specifying RMAC as a recommended MAC algorithm for use
with either AES and Triple DES. In response to the comments, NIST has
posted a consultation paper at http://csrc.nist.gov/CryptoToolkit/modes/,
At 01:58 PM 4/3/03 +1200, Peter Gutmann wrote:
...
A better suggestion for killing it: Write letters strongly encouraging the
PKI-based method.
*Snork!* That's perfect.
...as computer security professionals, we feel that it is our duty to
advise the legislature of the critical importance of