At 04:36 PM 12/8/98 -0700, [EMAIL PROTECTED] wrote:
>I seem to recall hearing of a signature scheme wherein the message is
>recovered from the signature. Does this ring a bell for anyone? Any
>pointers?
You may be thinking of Ron Rivest's "chaffing and winnowing" proposal. The
message is sent a
>> Press release from the Ministry of Economy
>>
>>Export control for encryption technology loosened
>
>War is Peace, Freedom is Slavery?
My first reaction was something along that line. However there are a
two important points to note:
1.) Officials point out that "export control" does
Does anyone have any idea what happened
to this article on STOA and Echelon?
http://www.icdc.com/~paulwolf/nytimes.htm
I cannot seem to find it in the NY Times
archives. Is it really from 1998? Could
it be from 1997?
Anyone been in contact with the author?
Ern
Bill Stewart wrote:
>
> And, of course, shipping or even selling source for 40-bit RC4
> and 512-bit RSA is pretty simple, even if you don't include the note
> "WARNING: DO NOT CHANGE THE #define KEYLENGTH TO 128 OR THE
> #define MODULUSLENGTH TO 2048 AND RECOMPILE"
Software that are parametriz
A BXA spokesperson said today that the text of the recent
Wassenaar agreement had been received yesterday and it is
now being prepared for release on the BXA website
(www.bxa.doc.gov) maybe by the end of the week but maybe
not until next week. She said she expected the US to be the
first to p
It would be helpful if the list included the approximate size in Mb of each
archive. I'm making arrangements for some mirrors here in Hong Kong, and I
need an estimate of the space needed.
Thanks --
Enzo
-Original Message-
From: Michael Paul Johnson <[EMAIL PROTECTED]>
To: John Young <[
>I've always wanted to set up some secret-sharing filesystem where
>you have to download multiple "shares" to reconstruct the data.
>But other combinations of those exact same shares give other data.
I've also been toying with this idea for a few years. Throw in
Reed-Solomon code, and you can mak
--- begin forwarded text
Date: Tue, 8 Dec 1998 00:04:57 -0500 (EST)
From: Somebody
To: [EMAIL PROTECTED]
Subject: Quick ping about Surety Technologies
Do you know anything about Surety's claim to have a patent on
digitally signed document timestamps? Seems a little suspicious to
me, but I hav
> What an incredibly talented liar, I mean diplomat, he is.
Ah, but you forget that the definition of diplomacy
is the art of lying in State.
--dan
I don't understand something ...
Why doesn't The Register have anything
on Echelon and the EU discussion which
got squashed (undoubtedly by UK or USA
lobbying)? It would appear that both
in the USA and in the UK, there is
very little news about Echelon and
global surveillance.
Ern
--- begin forwarded text
Mime-Version: 1.0
X-Sender: [EMAIL PROTECTED]
Date: Mon, 7 Dec 1998 13:02:59 -0500
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
From: Robert Hettinga <[EMAIL PROTECTED]>
Subject: DCSB: Ira Heffan and Mike Schmelzer; "Software Patents" and
Digital Commerce
Cc: Ira Heffan <[
Phillip Hallam-Baker wrote:
>In addition under the single European act the entire country of Europe is
>one export zone for crypto control purposes.
Unfortunately, not yet. The European Commission has proposed amending the
Dual-Use regulations to allow the free circulation of crypto products amo
This came over freshmeat a few days ago.
subject: Speak Freely for Unix 6.1e
added by: sean <[EMAIL PROTECTED]>
time: 20:12
category: Software
Speak Freely allows you to talk over a network. If your network connection
isn't fast enough to support real-time voice data, various forms of
comp
[EMAIL PROTECTED] writes:
> I seem to recall hearing of a signature scheme wherein the message is
> recovered from the signature. Does this ring a bell for anyone? Any
> pointers?
Signature schemes are usually divided into schemes that provide
"message recovery" (like RSA), and schemes that don'
Perhaps you are thinking about a signature scheme proposed by Bellare &
Rogaway in Eurocrypt'96. Probabilistic Signature Scheme with Message
recovery (PSS-R).
Bellare has a complete web about his articles try:
http://www-cse.ucsd.edu/users/mihir/
http://www-cse.ucsd.edu/users/mihir/papers/exacts
At 12:04 AM -0500 on 12/9/98, Ulf Möller wrote:
> Press release from the Ministry of Economy
> http://www.bmwi.de/presse/1998/1208prm2.html, my translation:
>
>Export control for encryption technology loosened
War is Peace, Freedom is Slavery?
:-).
-
Robert A. Hettinga
Subliminal channels are available in most signature schemes, including
DSS...
Enzo
-Original Message-
From: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
Date: Wednesday, December 09, 1998 2:34 PM
Subject: Recovering message from signature
>I seem to r
John Gilmore has proposed setting up crypto archives in
many countries to avoid Wassenaar restriction problems.
Does anybody have a good source for information on web hosting providers
or other ISPs in a variety of countries around the world?
Shell accounts are nicer, because it's easier to create
Press release from the Ministry of Economy
http://www.bmwi.de/presse/1998/1208prm2.html, my translation:
Export control for encryption technology loosened
No "key recovery" for cryptographic products
At their plenary meeting on December 2nd and 3rd 1998 the 33 treaty
states of the
Excerpt from a speech by BXA's William Reinsch on December 7,
1998, at the Practising Law Institute conference "Coping with U.S.
Export Controls." Note final paragraph about detailed crypto
session today -- no report on that yet.
Full speech: http://jya.com/war120798-2.htm
Also by him yesterda
Interesting passage below. In particular,
notice the reference to the European Court
of Human Rights ruling. Can this help with
the crypto cause? After all, if software
is published elsewhere, it would be a
violation of freedom of speech to prevent
its publication in any way.
Ern
> From: http
Tradeoff time.
Q: Is it better for the providers of crypto resources to alarm/log
accesses to their websites or not?
I'd strongly argue not;
Team Despot will disguise itself and we are surveilled as we speak;
Team Legion loses if it creates targets for harvesting.
Q: Is coor
Sprach John Young <[EMAIL PROTECTED]>:
> From: <[EMAIL PROTECTED]>
> I would only add this caution. I think John is wrong in giving legal
> advice that Wassenaar is not binding without implementing legislation.
> That is an American approach to these matters. I believe that many,
> perhaps mo
I seem to recall hearing of a signature scheme wherein the message is
recovered from the signature. Does this ring a bell for anyone? Any
pointers?
--
Mike Stay
Cryptographer / Programmer
AccessData Corp.
mailto:[EMAIL PROTECTED]
At 09:10 AM 12/8/1998 -0500, John Young wrote:
>In response to John Gilmore's call for a foil to US-Wassenaar
>restrictions acoming, we've put up a preliminary list of international
>cryptography sources for mirroring:
>
> http://jya.com/crypto-free.htm
See also http://cryptography.org/freecry
25 matches
Mail list logo