Intrapolynomial cryptography

1999-08-24 Thread Nick Szabo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 An implication of proposals like hashcash, MicroMint, bit gold, etc. is that there is such a thing as intrapolynomial cryptography. Three motivations for intrapolynomial cryptography are (a) novel constructions such as MicroMint, (b) more accurate e

Re: bo2k cryptography

1999-08-24 Thread mischief
[EMAIL PROTECTED] wrote: > > The authors have announced and fixed one bug... Here's the details of that one: http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-08-1&[EMAIL PROTECTED] -- Forwarded message -- Date: Sun, 01 Aug 1999 21:29:40 -0500 From: Irwan Am

New Clinton Anti-Privacy Czar? (was Re: NewsScan Daily, 24August 1999 ("Above The Fold"))

1999-08-24 Thread Robert Hettinga
At 7:43 AM -0700 on 8/24/99, NewsScan wrote: > CLINTON ADMINISTRATION APPOINTS NEW E-COMMERCE ADVISOR > The Clinton Administration has appointed Elizabeth Echols to a new White > House post that will coordinate e-commerce issues. The Electronic Commerce > Working Group, which will be headed up

RE: ecc question

1999-08-24 Thread William Whyte
> >The ecc discrete log problem is given points A and B, find integer x > >such that xA=B if it exists. I assume that most crypto implementations > >of ecc use finite fields; in a finite field can you assume that x > >exists? > x is just an integer in this case. Since there's no multiplication

Re: ecc question

1999-08-24 Thread Dan Bailey
x is just an integer in this case. Since there's no multiplication operator (we hope) in the curves used for crypto, x is just an indicator of how many times to square and multiply. Now as to whether you always have an x such that xA=B exists, that depends on the following: Are A and B both poi

Yarrow

1999-08-24 Thread Hans Viens
Hi Folks,   I would like to know if someone of you know the existence of a version of Yarrow that doesn't use DLL ?  Or maybe someone of you that already modify it...   Thanks,   Best regards,   Hans...