[no subject]

2002-08-09 Thread AARG!Anonymous
Adam Back writes a very thorough analysis of possible consequences of the amazing power of the TCPA/Palladium model. He is clearly beginning to get it as far as what this is capable of. There is far more to this technology than simple DRM applications. In fact Adam has a great idea for how

[no subject]

2002-04-15 Thread Pawe Krawczyk
,,Cryptanalysis of Block Ciphers with Overdefined Systems of Equations'' Nicolas Courtois and Josef Pieprzyk http://eprint.iacr.org/2002/044/ Abstract: Several recently proposed ciphers are built with layers of small S-boxes, interconnected by linear key-dependent layers. Their security relies

[no subject]

2001-12-04 Thread Richard Guy Briggs
On Tue, Dec 04, 2001 at 03:32:04PM +0800, Enzo Michelangeli wrote: Actually, the authentication is not performed by Visa, but by the issuer (the member bank that has issued the card). Visa only manages a directory server where the merchant's plugin looks up the first six digits of the card

No Subject

2001-09-17 Thread David Honig
At 02:14 PM 9/17/01 -0400, Jim Windle wrote: Second, if we assume for a minute that the terrorist use public key systems Given their 1. quality opsec including 2. wise avoidance of wireless phones, etc, and their 3. dependence on long-time personal contacts, isn't it more likely that private