On Wed, Sep 08, 2004 at 12:44:39PM -0700, Major Variola (ret) wrote:
[...]
> In an RSA cryptosystem the public exponent is typically low, often
> 3 or 65537 (for efficiency reasons only a few bits are set; the other
> constraint is that your message, raised to that power, wraps in your
> modulus, w
>From: "\"Hal Finney\"" <[EMAIL PROTECTED]>
>Sent: Sep 8, 2004 2:48 PM
>To: [EMAIL PROTECTED]
>Subject: Seth Schoen's Hard to Verify Signatures
>The method Seth describes is to include a random value in the signature
>but not to include it in the message. He shows a sample signature
>with 3 decim
Hi
I proposed a related algorithm based on time-lock puzzles as a step
towards non-parallelizable, fixed-minting-cost stamps in section 6.1
of [1], also Dingledine et al observe the same in [2].
The non-parallelizable minting function is in fact the reverse: sender
encrypts (expensively) and the
At 11:48 AM 9/8/04 -0700, Hal Finney wrote:
>Seth Schoen of the EFF proposed an interesting cryptographic primitive
>called a "hard to verify signature" in his blog at
>http://vitanuova.loyalty.org/weblog/nb.cgi/view/vitanuova/2004/09/02 .
>The idea is to have a signature which is fast to make but
Seth Schoen of the EFF proposed an interesting cryptographic primitive
called a "hard to verify signature" in his blog at
http://vitanuova.loyalty.org/weblog/nb.cgi/view/vitanuova/2004/09/02 .
The idea is to have a signature which is fast to make but slow to verify,
with the verification speed unde
Well, still ruminating...
The kind of regulations that regulatory bodies have made in the past are in
their nature different from these secret rules I still believe. This is of
course aside from their secret nature.
Previously, if a regulatory body such as the FCC enacted some kind of
policy, t
At 11:19 AM 9/8/04 -0400, Tyler Durden wrote:
>Hum. I wonder. Do you think these secret regulations are communicated
via
>secure channels? What would happen if someone decided to send their own
>regulations out to all of the local airline security offices rescinding
any
>private regs, particularly
At 03:15 PM 9/6/2004, Hadmut Danisch wrote:
On Mon, Sep 06, 2004 at 11:52:03AM -0600, R. A. Hettinga wrote:
>
> E-mail security company MX Logic Inc. will report this week that 10 percent
> of all spam includes such SPF records,
I have mentioned this problem more than a year ago in context of
my RM
hello,
The security of elliptic curve cryptosystems depend on
the difficulty in solving the elliptic curve discrete
log problem(ECDLP). If any body gets to prove that
P=NP, then all the public key cryptosystemts which
rely on 'hard' problems will be useless for crypto.
Sarath.
--- Sunder <[EMAI