The authors have announced and fixed one bug where the keys
generated were always the same. Full scrutiny would be advisable
before deployment.
Bluefish wrote:
>
> I've received some questions by email which are beyond my ability to
> answer. The questions are about the cryptographic strength of
The ecc discrete log problem is given points A and B, find integer x
such that xA=B if it exists. I assume that most crypto implementations
of ecc use finite fields; in a finite field can you assume that x
exists?
--
Mike Stay
Cryptographer / Programmer
AccessData Corp.
mailto:[EMAIL PROTECTED]
--- begin forwarded text
Date: Mon, 23 Aug 1999 13:47:19 -0400 (EDT)
From: Christof Paar <[EMAIL PROTECTED]>
To: WPI Crypto Seminar: ;
Subject: EE578/CS578, Cryptography and Data Security
Sender: [EMAIL PROTECTED]
Reply-To: Christof Paar <[EMAIL PROTECTED]>
Below is a description of EE578/CS57
Marcus Leech wrote:
>
> "Steven M. Bellovin" wrote:
> >
> > It's clearly not automatic, but I suspect it would work
> >
> User behaviour is the weak point here--while the browsers WILL notify
> you that the cert is signed by a CA you don't recognize, they also
> give you the option of acc
At 11:06 PM -0700 8/21/99, Martin Minow wrote:
>At 2:39 PM -0700 8/21/99, David Honig wrote:
>>In the Aug 16 '99 EETimes, there are several articles
>>about software radios. These have analog front ends,
>>and after down-conversion are digital. This lets you
>>deal with complex back-compatabilit
> From: "Arnold G. Reinhold" <[EMAIL PROTECTED]>
> [...]
> I spent some time searching the Web for hardware randomness sources
> and I have summarized what I found at
> http://www.world.std.com/~reinhold/truenoise.html. I located several
> serial port RNG devices and some good sources of white
I recall seeing programs that would play music (not hi-fi :) on a nearby
radio receiver, in 1962. Isn't this what Tempest stuff is all about?
Barney Wolff <[EMAIL PROTECTED]>
Hello,
I've compiled a web page with detailed descriptions of my previous
findings, of another transmission method and of experiments showing
the feasibility of data transmission and recovery using these methods.
The address is:
http://altern.org/berke/tempest/
--
Berke Durak [EMAIL P