nts to key to be called, but any such procedure
>> will come under attack.
>>
>
> ___
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinf
transition?
>
> Regards,
> Eduardo
>
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2.0.22 (GNU/Linux)
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
> iF4EAREIAAYFAlK2AkMACgkQqrnAQZhRnarZDgEAsaB0O3+sV8FEvGkpPATOgWoN
> md6Wt6TYCdpZ2oUTdkABAI7+
DjG6DhI/ha9JovovXEwT7B1tckoAP2Ns0KO3V8CPBC3tOtZhQETjiuK
> 1Psu3NE=
> =ENte
> -END PGP MESSAGE-
>
>> let's try an experiment: one bitcoin (~200$USD) to whoever
>> successfully encrypts a message to my key.
>
> That’s a serious sweetener. So I assume that I h
would make me concerned if my
> non-profit *depended* on funding from that source.
>
>
> --
> @kylemaxwell
>
--
Kelly John Rose
Mississauga, ON
Phone: +1 647 638-4104
Twitter: @kjrose
Document contents are confidential between original recipients and sender.
_
t happened in the
>> federal government this month?
>>
>
> I'm not privy to everything that happened in the federal government this
> month. Perhaps you could elaborate?
>
>
>
> ___
> cryptography mailing list
>
04 PM, Paul Wouters wrote:
> Reasoning that way, you're very quickly left with not but a tin foil
> hat. Let's say we agree on twofish. then NIST/NSA certifies it for FIPS.
> Are we than taking that as proof it is compromised and figure out
> something else?
--
Kelly John Rose
Mi
good hash function in my back pocket. So I'm going to
> use them. If it turns out that there's a good explanation, that
> BULLRUN is wrong, it's just software.
>
> Your situation is different, as is everyone else's. I admire your
> cool head, but I
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
--
Kelly John Rose
Mississauga, ON
Phone: +1 647 638-4104
Twitter: @kjrose
Document contents are confidential between original recipients and s