I'm going to go off on a bit of a tangent here... this is really
a security issue, not a crypto issue, but I think it's something
that we'd all do well to think about.
Derek Atkins wrote:
sniffible, none of my passwords were. I happen to be one of the
lucky few who has made it through the
I know I'm a bit out of the loop, as I have not been studying the AES
submissions like the rest of you, but a couple of questions come to mind
on reading the meeting reports.
1) Does the power analysis apply to all smart cards, or only those that
draw from a reader?
The reason that I
On Thu, Mar 25, 1999 at 04:22:11PM +, William Allen Simpson wrote:
I know I'm a bit out of the loop, as I have not been studying the AES
submissions like the rest of you, but a couple of questions come to mind
on reading the meeting reports.
1) Does the power analysis apply to all
At 08:35 AM 3/25/99 -0800, Jurgen Botz wrote:
Yes, I could demand that all my remote users be running NT4.0SP4 with
some additional security patches and have all their services turned
off (or better still, Linux or *BSD configured by my network
engineers), but how am I going to enforce this?