Interesting study of public keys:  http://eprint.iacr.org/2012/064.pdf

 

NY Times article:
http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an
-online-encryption-method.html?_r=1

 

By the way, if anyone feels this sort of topic is inappropriate for this
list, then please let me know.

 

Cheers,

 

Paul

________________________________________________________________________
_____________________________ 
Paul A. Suhler, PhD | Firmware Engineer | Quantum Corporation | Office:
949.856.7748 | paul.suh...@quantum.com <mailto:paul.suh...@quantum.com>

Preserving the World's Most Important Data. Yours.(tm) 

 

----------------------------------------------------------------------
The information contained in this transmission may be confidential. Any 
disclosure, copying, or further distribution of confidential information is not 
permitted unless such privilege is explicitly granted in writing by Quantum. 
Quantum reserves the right to have electronic communications, including email 
and attachments, sent across its networks filtered through anti virus and spam 
software programs and retain such messages in order to comply with applicable 
data security and retention requirements. Quantum is not responsible for the 
proper and complete transmission of the substance of this communication or for 
any delay in its receipt.

Reply via email to