To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: GnuPG 1.2 released
From: Werner Koch <[EMAIL PROTECTED]>
Mail-Followup-To: [EMAIL PROTECTED]
Hello!
We are pleased to announce the availability of a new stable release of
GnuPG: Version 1.2.0
The GNU Privacy Guard (GnuPG) is GNU's tool f
It might be possible to get the same effect using a conventional
silicon chip. I have in mind a large analog circuit, something like a
multi-stage neural network. Random defects would be induced, either
in the crystal growing process or by exposing the wafer at one or
more stages with a spray
Bill Frantz wrote:
>If the challenger selects several of his stored challenges, and asks the
>token reader to return a secure hash of the answers (in order), no
>information will be leaked about the response to any individual challenge.
>This procedure will allow the challenger to perform a large
At 5:11 PM -0700 9/20/02, David Wagner wrote:
>Perry E. Metzger wrote:
>>But if you can't simulate the system, that implies that the challenger
>>has to have stored the challenge-response pairs because he can't just
>>generate them, right? That means that only finitely many are likely to
>>be stor
Markus Friedl wrote:
> yes, but the idea and rc5 support can be disabled by removing the
> directories, whereas the license in question is spread all
> over the source tree.
Correct. We'll take care of that before 0.9.8 is released - promised.
--
Ulf Möller * Munich, Germany * E-Mail: ulfm epo
In message <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
.cmu.edu writes:
>Perry E. Metzger wrote:
>> An idea from some folks at MIT apparently where a physical token
>> consisting of a bunch of spheres embedded in epoxy is used as an
>> access device by shining a laser through it.
>
>I can't dig up the
On Tue, Sep 24, 2002 at 08:29:52PM +0200, Ulf Moeller - Mailing Lists wrote:
> By the way, OpenSSL has always included patented algorithms such as RSA and
> IDEA, together with warnings about patent issues in the documentation and
> compile time switches to disable algorithms that are known to be
> *In addition* to that, *if* you have software patents and you
> promise not to sue Sun over them because of an infringement you
> find in the donated code, then Sun promises that it won't sue
> you either. Sun does not forbid people from using the donated
> code on the basis of whether or not t
Don Coppersmith questions Courtois and Pieprzyk AES results -- see:
http://makeashorterlink.com/?K27C515E1
--
Perry E. Metzger[EMAIL PROTECTED]
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscr
On Tue, 24 Sep 2002, Bodo Moeller wrote:
>On Tue, Sep 24, 2002 at 01:29:29PM +0100, Ben Laurie wrote:
>> Markus Friedl wrote:
>
>>> With this code OpenSSL is turning into a non-free project.
>
>> As has been observed elsewhere, the patent stuff only applies if you
>> make a similar promise to S
At 06:20 PM 09/23/2002 +0100, Ben Laurie wrote:
>David Wagner wrote:
>>What is it, then?
>
>The ultimate pokemon card!
But if you're trying to use the card in
two-players-competing mode, as opposed to just
"I've got a card you don't have" mode,
how do you decide who wins?
Where are they on the ro
> On Tue, 24 Sep 2002 08:32:30 -0700,
Greg Broiles <[EMAIL PROTECTED]> said:
> Do you have an alternate explanation for the terms of Sun's license?
The 3 terms may be considered as:
This reciprocal covenant only affects the code which
is contributed by Sun this time.
On Tue, Sep 24, 2002 at 01:29:29PM +0100, Ben Laurie wrote:
> Markus Friedl wrote:
>> With this code OpenSSL is turning into a non-free project.
> As has been observed elsewhere, the patent stuff only applies if you
> make a similar promise to Sun. If you don't want to have Sun not sue you
> w
At 10:57 PM 9/24/2002 +0900, Noriyuki Soda wrote:
>Greg Broile wrote:
> > in the OpenSSL library, provided that the people who don't want to be
> > sued comply with a list of conditions:
> :
> > (2) don't modify Sun's code as provided by Sun, don't use only parts
> > of the donated code,
Apologies if you receive this more than once.
---
STORK CRYPTOGRAPHY WORKSHOP:
Towards a Roadmap for Future Research
November 26-27, 2002, Bruges, BELGIUM
Markus Friedl wrote:
> On Tue, Sep 24, 2002 at 01:30:19PM +0100, Ben Laurie wrote:
>
>>We have not changed the licence. If you enable the Sun code, then you
>>are bound by an additional licence.
>
>
> The additional licence is all over the tree, if I remove those files
> than OpenSSL becomes u
Greg Broile wrote:
> in the OpenSSL library, provided that the people who don't want to be
> sued comply with a list of conditions:
:
> (2) don't modify Sun's code as provided by Sun, don't use only parts
> of the donated code, and don't remove the license text from the code.
I think this
Markus Friedl wrote:
> On Mon, Sep 23, 2002 at 02:50:20PM +0100, Ben Laurie wrote:
>
>>>(1) they promise not to sue Sun for infringing any of their own patents
>>>which might
>>>cover the use of the donated code
>>>
>>>(2) don't modify Sun's code as provided by Sun, don't use only parts of
>>>t
--- begin forwarded text
Status: RO
Date: Mon, 23 Sep 2002 21:39:53 -0400
To: undisclosed-recipient:;
From: Monty Solomon <[EMAIL PROTECTED]>
Subject: "Reversible data hiding"
Xerox, University of Rochester Researchers Discover Better Way to
Embed, Remove Hidden Data in Digital Image
19 matches
Mail list logo