Differential Path for SHA-1 with complexity O(2**52)
Cameron McDonald, Philip Hawkes, and Josef Pieprzyk
Macquarie University
http://eprint.iacr.org/2009/259.pdf
--
I)ruid, CĀ²ISSP
dr...@caughq.org
http://druid.caughq.org
signature.asc
Description: This is a digitally signed message part
travis+ml-cryptogra...@subspacefield.org wrote:
> http://www.matasano.com/log/1749/typing-the-letters-a-e-s-into-your-code-youre-doing-it-wrong/
>
> Towards the end of this rather offbeat blog post they describe a
> rather clever attack which is possible when the application provides
> error messa
NIST has published a working draft of the Cloud Computing Security presentation:
http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
Both of the documents on this page are excellent read for anyone
interested in Cloud Computing.
Some of the Security Advantages mentioned in the presentation
On Jun 10, 2009, at 4:19 PM, travis+ml-cryptogra...@subspacefield.org
wrote:
Reading really old email, but have new information to add.
On Wed, Oct 03, 2007 at 02:15:38PM +1000, Daniel Carosone wrote:
Speculation: the drive always encrypts the platters with a (fixed)
AES
key, obviating t