Travis H. [EMAIL PROTECTED] writes: On 5/14/06, Victor Duchovni [EMAIL PROTECTED] wrote: Security is fragile. Deviating from well understood primitives may be good research, but is not good engineering. Especially fragile are: Point taken. This is not for a production system, it's a
I've googled for New Hash Functions and their Use in Authentication and Set Equality and found several citations but no electronic copies. I don't have access to a library that might have it, does anyone here have one? Thanks.
http://www.garlic.com/~lynn/rfcidx14.htm#4492 4492 I Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS), Blake-Wilson S., Bolyard N., Gupta V., Hawk C., Moeller B., 2006/05/16 (35pp) (.txt=72231) (Refs 2246, 3268, 3279, 3280, 4346, 4366) (was
[EMAIL PROTECTED] writes: You and I are in agreement, but how do we get the seemingly (to us) plain truth across to others? I've been trying for a good while now, reaching a point where I'd almost wish for a crisis of some sort as persuasiveness is not working. We are probably
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] The thing I've always wondered about stream ciphers is why we only talk about linear ones. A stream cipher is fundamentally constructed of two things: A stream of bits (alleged to be unpredictable) as long as
Call for Participation Intensive Program on Information and Communication Security IPICS 2006 Summer Course 17-28 July 2006, K.U. Leuven, Belgium https://www.cosic.esat.kuleuven.be/ipics2006/?i=S Special Focus: Privacy Technology (26-28 July) IPICS is a two week long summer school intended for
Cartoon of the day: http://www.ibiblio.org/Dave/Dr-Fun/df200605/df20060517.jpg [Hat tip to Steve Bellovin for pointing it out to me...] -- Perry E. Metzger[EMAIL PROTECTED] - The Cryptography Mailing List