At 10:04 AM 3/7/2003 +, Ben Laurie wrote:
Indeed. The commonly used one is ECPP which uses elliptic curves cunningly
to not only prove primality, but to produce a certificate which can be
quickly verified.
Probabilistic prime tests are just that - probable. ECPP actually proves it.
Does anyo
At 02:30 PM 3/5/2003 -0500, Steven M. Bellovin wrote:
>From: Somebody
>
>Technically, since their signal speed is slower than light, even
>transmission lines act as storage devices.
>
>Wire tapping is now legal.
The crucial difference, from a law enforcement perspective, is how hard
it is to get th
At 01:47 PM 3/2/2003 +, MindFuq wrote:
* Tim Dierks <[EMAIL PROTECTED]> [2003-03-02 12:27]:
>
> This would seem to imply to me that the wiretap act does not apply to any
> normal telephone conversation which is carried at any point in its transit
> by an electronic switch,
At 01:39 PM 2/27/2003 -0500, R. A. Hettinga wrote:
At 9:01 AM -0500 on 2/27/03, BNA Highlights wrote:
> WIRETAP ACT DOES NOT COVER MESSAGE 'IN STORAGE' FOR SHORT
> PERIOD
> BNA's Electronic Commerce & Law Report reports that a
> federal court in Massachusetts has ruled that the federal
> Wiretap Ac
vice as secret; some
categories that come to mind include protecting non-cryptographic
information, such as the capabilities of the communication channel. Also,
many systems on the shuttle are obsolete by modern standards, and it's
possible that the communications security is simil
At 01:53 PM 9/20/2002 +0200, Hadmut Danisch wrote:
>I'm looking for a court decision about a case where
>FBI agents fooled russian hackers in order to gain
>their passwords and to intrude their computers.
>
>Unfortunately (or better: fortunately) I'm unexperienced
>with the american court system.
e
questions and brainstorm a little?
Thanks,
- Tim Dierks
[EMAIL PROTECTED]
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
At 09:07 PM 8/12/2002 +0100, Adam Back wrote:
>At some level there has to be a trade-off between what you put in
>trusted agent space and what becomes application code. If you put the
>whole application in trusted agent space, while then all it's
>application logic is fully protected, the danger
At 07:30 PM 8/12/2002 +0100, Adam Back wrote:
>(Tim Dierks: read the earlier posts about ring -1 to find the answer
>to your question about feasibility in the case of Palladium; in the
>case of TCPA your conclusions are right I think).
The addition of an additional security ring with
ket will not support a high differential price, and the
technologies will not see widespread acceptance.
- Tim Dierks
PS - I'm looking for a job in or near New York City. See my resume at
<http://www.dierks.org/tim/resume.html>
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
re must be many alternatives out there.
If you know of such an ASP or vendor, please send me an e-mail and I'll
summarize to the list.
Thanks,
- Tim Dierks
-
The Cryptography Mailing List
Unsubscribe by sending "unsu
11 matches
Mail list logo