RE: [Haifux] Lecture after W2L

2004-08-18 Thread Tzahi Fadida
yeah sounds great.

Regards,
tzahi.

 -Original Message-
 From: Haifux - Haifa Linux Club 
 [mailto:[EMAIL PROTECTED] On Behalf Of Orr Dunkelman
 Sent: Wednesday, August 18, 2004 3:16 PM
 To: Haifa Linux Club
 Subject: [Haifux] Lecture after W2L
 
 
 
 After a lot of crypto stuff went here, I was wondering 
 whether an introducary lecture about [EMAIL PROTECTED] would interest you.
 
 The idea is to talk about:
 a) private key encryption - why, who and how (and what do we 
 mean when we say something was broken)
 b) public key encryption - why who and how.
 c) a bit on PKI
 d) about signatures - what it is, how it is done.
 e) cryptographic hash funtions - what is a collision.
 
 if time permits I'll try to cover
 f) Secure multi party computation and Private information retrival
 g) election schemes
 h) electronic cash
 
 Nee's and Ya's?
 
 -- 
 Orr Dunkelman,
 [EMAIL PROTECTED]
 
 Any human thing supposed to be complete, must for that 
 reason infallibly be faulty -- Herman Melville, Moby Dick.
 
 Spammers: http://vipe.technion.ac.il/~orrd/spam.html
 GPG fingerprint: C2D5 C6D6 9A24 9A95 C5B3  2023 6CAB 4A7C 
 B73F D0AA (This key will never sign Emails, only other PGP keys.)
 
 --

 Haifa Linux Club Mailing List (http://www.haifux.org)
 To unsub send an empty message to [EMAIL PROTECTED]
 
 
 
 



--
Haifa Linux Club Mailing List (http://www.haifux.org)
To unsub send an empty message to [EMAIL PROTECTED]




Re: [Haifux] Lecture after W2L

2004-08-18 Thread Avi Chen {Allnet Computers}
WELCOMED
WELCOMED
WELCOMED

Avi Chen {Allnet Computers}
mailto:[EMAIL PROTECTED]
mailto:[EMAIL PROTECTED]
Tel: 04-8345825
Mobile: 052-2992675


- Original Message -
From: Orr Dunkelman [EMAIL PROTECTED]
To: Haifa Linux Club [EMAIL PROTECTED]
Sent: Wednesday, August 18, 2004 3:15 PM
Subject: [Haifux] Lecture after W2L



 After a lot of crypto stuff went here, I was wondering whether an
 introducary lecture about [EMAIL PROTECTED] would interest you.

 The idea is to talk about:
 a) private key encryption - why, who and how (and what do we mean when we
 say something was broken)
 b) public key encryption - why who and how.
 c) a bit on PKI
 d) about signatures - what it is, how it is done.
 e) cryptographic hash funtions - what is a collision.

 if time permits I'll try to cover
 f) Secure multi party computation and Private information retrival
 g) election schemes
 h) electronic cash

 Nee's and Ya's?

 --
 Orr Dunkelman,
 [EMAIL PROTECTED]

 Any human thing supposed to be complete, must for that reason infallibly
 be faulty -- Herman Melville, Moby Dick.

 Spammers: http://vipe.technion.ac.il/~orrd/spam.html
 GPG fingerprint: C2D5 C6D6 9A24 9A95 C5B3  2023 6CAB 4A7C B73F D0AA
 (This key will never sign Emails, only other PGP keys.)

 --
 Haifa Linux Club Mailing List (http://www.haifux.org)
 To unsub send an empty message to [EMAIL PROTECTED]





--
Haifa Linux Club Mailing List (http://www.haifux.org)
To unsub send an empty message to [EMAIL PROTECTED]