- Original Message -
From: bear [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Wednesday, August 27, 2003 5:49 AM
Subject: Re: blackmail / real world stego use
[...]
That would imply packet recording and correlation on a level
greater than we've ever considered to be in the arsenal of
...one-way encryption algorithms guaranteed to be injective (i.e.,
deterministically collision-free)? Or are there theoretical reasons
against their existence?
I'm looking for algorithms where every piece of code and data is public,
thus excluding conventional enciphering with a secret key.
Enzo
if something better can be done.
Enzo
- Original Message -
From: Amir Herzberg [EMAIL PROTECTED]
To: 'Enzo Michelangeli' [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Sunday, November 16, 2003 10:44 PM
Subject: RE: Are there...one-way encryption algorithms
Enzo asked,
Are there one-way
- Original Message -
From: Perry E.Metzger [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, November 27, 2003 7:24 AM
Subject: Problems with GPG El Gamal signing keys?
Some notes have been floating around claiming that there are bugs in
GPG's use of El Gamal keys. For
- Original Message -
From: Bill Stewart [EMAIL PROTECTED]
Sent: Sunday, May 09, 2004 12:44 PM
Subject: Re: Can Skype be wiretapped by the authorities?
[...]
BUT, unfortunately, the implementation is closed source, so there
are no guarantees that the software is not GAKked.
Also no
- Original Message -
From: Hal Finney [EMAIL PROTECTED]
Sent: Friday, November 05, 2004 7:01 AM
Tyler Durden writes:
So my newbie-style question is, is there an eGold that can be
verified, but not accessed, until a 'release' code is sent?
In other words, say I'm buying some
- Original Message -
From: Ian Grigg [EMAIL PROTECTED]
To: Hal Finney [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Sunday, November 07, 2004 11:21 AM
[Hal:]
Interesting. In the e-gold case, both parties have the same bank,
e-gold ltd. The
- Original Message -
From: John Denker [EMAIL PROTECTED]
Sent: Thursday, January 06, 2005 3:06 AM
Enzo Michelangeli wrote:
[...]
If the PRNG uses a
really non-invertible algorithm (or one invertible only
with intractable complexity), its output gives no insight
whatsoever
- Original Message -
From: [EMAIL PROTECTED]
To: cryptography@metzdowd.com
Sent: Friday, January 07, 2005 9:30 AM
Subject: Re: entropy depletion (was: SSL/TLS passive sniffing)
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Enzo
Michelangeli
Sent: Tuesday, January
AFAIK, the cards are still the same (Sony FeliCa:
http://www.sony.net/Products/felica/): I never changed mine since I got it
several years ago. The same card was also adopted in 2002 by EZ-Link in
Singapore (http://www.ezlink.com.sg ).
Enzo
- Original Message -
From: Anne Lynn Wheeler
- Original Message -
From: Perry E. Metzger [EMAIL PROTECTED]
To: Adam Back [EMAIL PROTECTED]
Cc: Peter Saint-Andre [EMAIL PROTECTED]; cryptography@metzdowd.com
Sent: Friday, August 26, 2005 8:55 PM
Subject: Re: Another entry in the internet security hall of shame
[...]
Remember
- Original Message -
From: Perry E. Metzger [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: cryptography@metzdowd.com
Sent: Tuesday, September 13, 2005 11:32 PM
Subject: Re: Clearing sensitive in-memory data in perl
[...]
What the world really needs is something between C++ and C -- a
12 matches
Mail list logo