Here is the blind DSA signature based on MacKenzie and Reiter,
http://www.ece.cmu.edu/~reiter/papers/2001/CRYPTO.pdf, in graphical form.
Recall that a DSA public key is p, q, g, y; private key x; signature on
hash h is:
Choose k q
r = g^k mod p mod q
s = rx/k + h/k mod q
Diebold knew of legal risks
Attorneys warned firm that use of uncertified vote-counting software
violated state law
By Ian Hoffman
Tuesday, April 20, 2004 - Attorneys for
--- begin forwarded text
Subject: Is there a Brands certificate reference implementation?
From: Steve Furlong [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Date: 25 Apr 2004 12:14:30 -0400
Sender: [EMAIL PROTECTED]
Does anyone know of a reference implementation for Stefan Brands's
Ivan Krstic wrote:
I have to agree with Perry on this one: I simply can't see a compelling
reason for the push currently being given to ridiculously overpriced
implementations of what started off as a lab toy, and what offers - in
all seriousness - almost no practical benefits over the proper
A WHOLE book of secrets is what S.C. Coutinho gives in The Mathematics of
Ciphers, published by Universities Press (www.orientlongman.com) . A
Infoshop News -
How to WASTE and want not
posted by j1o2n3a4s5 on Sunday April 25 2004 @ 05:14PM PDT
WASTE would have to be pretty close to what you'd come up with.
WASTE provides a way for you to create secure ad hoc p2p
I am doing a presentation on the future of security,
which of course includes a component on cryptography.
That will be given at this conference on payments
systems and security: http://www.enhyper.com/paysec/
Would anyone there have any good predictions on how
cryptography is going
R. A. Hettinga wrote:
Wednesday, April 14, 2004
YOUR PAPERS, PLEASE ...
Paying for drinks with wave
of the hand
Club-goers in Spain get implanted chips for ID, payment purposes
Posted: April 14, 2004
Silicon Valley Biz Ink :: The voice of the valley economy
April 27, 2004
Press release distributed
by PR Newswire
Duelling crypto-crack press-releases this morning.
Ford vs. GM, er, Certicom vs. RSA...
Silicon Valley Biz Ink :: The voice of the valley
--- begin forwarded text
Date: Tue, 27 Apr 2004 12:33:54 -0400
From: Declan McCullagh [EMAIL PROTECTED]
User-Agent: Mozilla Thunderbird 0.5 (Macintosh/20040208)
To: [EMAIL PROTECTED]
Subject: [Politech] A criticism of Gmail and a call for encryption
Is something known about the details of the crypto protocol within
Skype? How reliable is the encryption?
Can Skype be wiretapped by the authorities? With collaboration of the
Skype operator? Without?
Axel H Horns
Tue Apr 27 15:00:10 2004 Pacific Time
UC San Diego Engineering Professor Wins Guggenheim Fellowship
SAN DIEGO, Calif., April 27 (AScribe Newswire) -- A computer
DIMACS Workshop on Security Analysis of Protocols
June 7 - 9, 2004
DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ
John Mitchell, Stanford, [EMAIL PROTECTED]
Ran Canetti, IBM Watson, [EMAIL
Mail list logo