Ben Laurie [EMAIL PROTECTED] writes:
I was asked to recommend books on security/crypto/copy protection for the
non-tekky and realised I had no idea at all! Does anyone out there have
suggestions?
Cheers,
Ben.
I hear that `Underground', http://www.underground-book.com/ is
excellent foie
[Forwarded only because it has been a slow week -- normally, I don't
really want "snake oil of the week" postings because, frankly, there
is too much snake oil and most of it is uninteresting. This example is
no exception -- there is nothing more amusing about this snake oil
than most others.
http://speechbot.research.compaq.com/
The "transcript" that is output by the speech recognition software
(and shown in small extracts on the Results and Details pages) rarely
matches what was spoken exactly, and often often does not read very
well. Because different people speak at
Vin McLellan [EMAIL PROTECTED] writes:
Talking about timely and untimely comments.
Check out Newsweek's credulous, confused, and tech-ignorant report
about the (pre-oversight-hearing) moaning and and weeping at Fort Meade.
This [Sy Hersh] story has been re-reported
spy on terrorists, he said that the NSA's "blanket approach" to
monitoring telephone calls and e-mails was "a serious breach of
privacy rights".
Cryptographer Julian Assange, who moderates the online Australian
discussion forum AUCRYPTO, discovered the departme
[from ntk]
Just when you thought you'd wait forever for a free DVD
player, along come two cracks at once. The first was the
leaking onto the Linux LIVID player mailing list of the DVD
Content Scrambling System code used by the Jon Johansen's
cracker
Robert Hettinga [EMAIL PROTECTED] writes:
Evidently, there are only 500 in the first printing, but I bet Stefan
didn't give them *all* away. :-).
I bet that if you put in a special order to Amazon with the ISBN and
the publisher in it, they'll manage to sell one to you on order. Upon
Anonymous [EMAIL PROTECTED] writes:
Quantum computers help cryptanalysis in a couple of specific ways.
They aren't all-purpose speeder-upers.
No. The reason I posted this abstract is because it says exactly the
opposite. *almost* any given Turing machine T can be turned into a
quantum machine
Quantum Physics, abstract
quant-ph/9910033
From: "Lane A. Hemaspaandra" [EMAIL PROTECTED]
Date (v1): Fri, 8 Oct 1999 03:48:56 GMT (17kb)
Date (revised v2): Mon, 11 Oct 1999 19:03:38 GMT (17kb)
Almost-Everywhere Superiority for Quantum Computing
Authors: Edith Hemaspaandra (RIT), Lane A.
"paul a. bauerschmidt" [EMAIL PROTECTED] writes:
neat question:
http://www.arcot.com/arcot_ieee.pdf
a method of protecting private keys using camouflage, in software, to
prevent dictionary attacks.
one password will decrypt correctly, many other passwords will produce
alternate,
Mention was made recently of a graphical keying method out of stanford (?) for
palm-pilots. Does anyone have a reference or url for the paper/code involved?
Cheers,
Julian.
- Forwarded message from send mail ONLY to cs -
From [EMAIL PROTECTED] Mon Sep 20 20:32:30 1999
Return-Path: [EMAIL PROTECTED]
Received: from yyy.lanl.gov (yyy.lanl.gov [204.121.6.60])
by suburbia.net (Postfix) with ESMTP id 8C5026C6A1
for [EMAIL PROTECTED]; Mon, 20 Sep
Welcome to the IQ.ORG Cryptography Server (aka Blinded)!
This is a private IRC server. It exists primarily as an encrypted live
communications network for the cryptography community and friends as
represented by the following mailinglists:
[EMAIL PROTECTED]
[EMAIL PROTECTED]
Rich Salz [EMAIL PROTECTED] writes:
Hm, I read the quote as "yeah, right, like herding cats it will happen."
Seeing "Bad" ulterior motives in RSA/Australia is also impugning Eric
and Tim, remember.
Bidzos and RSA have a pretty good record vis-a-vis US controls, and
it seems doubtful
[I figured I'd let people get out a message or two more but I don't
think I'm going to let the Bidzos slamming run much longer. It isn't
that I love him -- it is that I don't think the discussion is really
what the readers of Cryptography want to be viewing in their
mailboxes. --Perry]
Darren
"Recently, the administration announced that the 33 Wassenaar
countries had agreed on a common framework for export controls for
encryption products," added Bidzos. "This move appears designed to
strike a balance between industry and governments - it puts government
desired limits
16 matches
Mail list logo