Re: picking a hash function to be encrypted

2006-05-17 Thread Eric Rescorla
"Travis H." <[EMAIL PROTECTED]> writes: > On 5/14/06, Victor Duchovni <[EMAIL PROTECTED]> wrote: >> Security is fragile. Deviating from well understood primitives may be >> good research, but is not good engineering. Especially fragile are: > > Point taken. This is not for a production system, it

anyone have "New Hash Functions and their Use in Authentication and Set Equality"

2006-05-17 Thread Travis H.
I've googled for "New Hash Functions and their Use in Authentication and Set Equality" and found several citations but no electronic copies. I don't have access to a library that might have it, does anyone here have one? Thanks. --

Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)

2006-05-17 Thread Anne & Lynn Wheeler
http://www.garlic.com/~lynn/rfcidx14.htm#4492 4492 I Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS), Blake-Wilson S., Bolyard N., Gupta V., Hawk C., Moeller B., 2006/05/16 (35pp) (.txt=72231) (Refs 2246, 3268, 3279, 3280, 4346, 4366) (was draft-ietf-tls-

Re: NSA knows who you've called.

2006-05-17 Thread Russ Nelson
[EMAIL PROTECTED] writes: > You and I are in agreement, but how do we get > the seemingly (to us) plain truth across to > others? I've been trying for a good while now, > reaching a point where I'd almost wish for a > crisis of some sort as persuasiveness is not > working. > > We are prob

RE: the meaning of linearity, was Re: picking a hash function to be encrypted

2006-05-17 Thread Kuehn, Ulrich
> -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > > The thing I've always wondered about stream ciphers is why we only > talk about linear ones. A stream cipher is fundamentally constructed > of two things: A stream of bits (alleged to be unpredictable) as > lo

IPICS summer course in Computer Security

2006-05-17 Thread George Danezis
Call for Participation Intensive Program on Information and Communication Security IPICS 2006 Summer Course 17-28 July 2006, K.U. Leuven, Belgium https://www.cosic.esat.kuleuven.be/ipics2006/?i=S Special Focus: Privacy Technology (26-28 July) IPICS is a two week long summer school intended for f

PET 2006: Call for Participation

2006-05-17 Thread George Danezis
Call for Participation 6th Workshop on Privacy Enhancing Technologies (PET 2006) Robinson College, Cambridge, United Kingdom June 28 - June 30, 2006 http://petworkshop.org/2006/ Special Events: * Keynote speaker: Susan Landau, Sun Microsystems Laboratories on "The Missing Link", (Abstract at t

"It's funny because it's true..."

2006-05-17 Thread Perry E. Metzger
Cartoon of the day: http://www.ibiblio.org/Dave/Dr-Fun/df200605/df20060517.jpg [Hat tip to Steve Bellovin for pointing it out to me...] -- Perry E. Metzger[EMAIL PROTECTED] - The Cryptography Mailing List Unsu