After a lot of crypto stuff went here, I was wondering whether an introducary lecture about [EMAIL PROTECTED] would interest you.
The idea is to talk about: a) private key encryption - why, who and how (and what do we mean when we say something was broken) b) public key encryption - why who and how. c) a bit on PKI d) about signatures - what it is, how it is done. e) cryptographic hash funtions - what is a collision. if time permits I'll try to cover f) Secure multi party computation and Private information retrival g) election schemes h) electronic cash Nee's and Ya's? -- Orr Dunkelman, [EMAIL PROTECTED] "Any human thing supposed to be complete, must for that reason infallibly be faulty" -- Herman Melville, Moby Dick. Spammers: http://vipe.technion.ac.il/~orrd/spam.html GPG fingerprint: C2D5 C6D6 9A24 9A95 C5B3 2023 6CAB 4A7C B73F D0AA (This key will never sign Emails, only other PGP keys.) -------------------------------------------------------------------------- Haifa Linux Club Mailing List (http://www.haifux.org) To unsub send an empty message to [EMAIL PROTECTED]