On Thu, 30 May 2002, Natalia wrote:
QUIT
More specific please? Quit diddling my data? Quit typing so loud after
10:00pm? Quit my job???
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
If Governments really want us to behave like civilized human beings, they
should give serious
QUIT
3. Public support for federal workers falls to pre-Sept. 11 level
By Brian Friel
Americans support federal workers and trust the government less today than
they did immediately after the Sept. 11 terrorist attacks, a new survey shows.
The survey, issued Thursday by the Brookings Institution's
Hi List,
I am a newbie in cryptography. What I have learnt till
now is that in assymeric cryptography scenario we have
a private key and we generate the public key
corresponding to it and then we send it to the central
agency.
Suppose after sometime I have a private key and the
public key. Is
i guess my sense of humor was missed by most of you. i might have to
practice some more before going public unless i remain anonymous
(although it might be too late now).
h
On Thu, 30 May 2002 [EMAIL PROTECTED] wrote:
Jesus christ Hector! What the fuck are you planning to be when you grow
On Fri, 31 May 2002, surinder pal singh makkar wrote:
I am a newbie in cryptography. What I have learnt till
now is that in assymeric cryptography scenario we have
a private key and we generate the public key
corresponding to it and then we send it to the central
agency.
You don't have to
hi,
I was helping a friend if mine with rsa key
generation.if it helps u here it is.
I am posting the mail which i sent to him.
1:Choose 2 large prime numbers p q
2:choose n=p*q z=(p-1)*(q-1)
3:choose a number relatively prime to z anc call it
d.
two numbers (a,b) are said to be
F.B.I. Given Broad Authority to Monitor the Public
By THE ASSOCIATED PRESS
WASHINGTON (AP) -- Attorney General John Ashcroft on Thursday
gave the FBI broad new authority to monitor Internet sites,
libraries, churches and political organizations,
calling restrictions on domestic spying
--
From: Nomen Nescio[SMTP:[EMAIL PROTECTED]]
Sent: Thursday, May 30, 2002 12:20 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: FC: Hollywood wants to plug analog hole, regulate A-D
converters
Peter Trei writes:
My mind has been boggled, my
In Applied Cryptography, p. 87 (2nd ed., heading Bit Commitment Using One-Way
Functions) Schneier specifies that Alice must generate 2 random bit strings
before hashing, and then send one along with the hash as her commitment:
commitment = H(R1, R2, b), R1
Then she sends R2 and her bit to
On Friday, May 31, 2002, at 02:12 AM, Bill Stewart wrote:
If Ashcroft wants his underlings to monitor the internet,
TCP/IP will let him do lots of things, and Bugs will let him do more,
but if he needs cooperation from ISPs or other online service or
content providers, his choices are either
I ain't got that much schooling in these here matters, but it seems to me
that
in terms of the agreements, online agreements are pretty slacking when it
comes to verifying
that the end user actually read the document.
Most agreements online take advantage of the fact that a user is going to
skip
Ian Grigg wrote:
[...]
SSL for commerce is readily in place without batting an eyelid these days.
Costs are still way too high. This won't change until
browsers are shipped that treat self-signed certs as being
valid. Unfortunately, browser manufacturers believe in
cert-ware for a
Mike Rosing [EMAIL PROTECTED] wrote:
Having it be transparent where the user doesn't need to know
anything about how it works does not have to destroy the
effectiveness of digital signatures or crypto. When people sign a
document they don't know all the ramifications because few bother to
14 matches
Mail list logo