First  |  Prev |  Next  |  Last
Pages: 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53
Scalable Key Cryptography – New Cryptography for Your Perusal
I have opened a new website to promote the invention of this new cryptography. http://www.scalarcryptography.co.uk - see title box there for " Scalable Key Cryptography" Scalable key Cryptography An excursion into modular arithmetic enables a configurable encryption template that provides a copious supply of ... 23 Dec 2009 13:51
Decimation
Decimation in crypto means selecting every tenth, and in general, selecting every nth element from a sequence in order to hide exploitable patterns in it. (See http://www.ciphersbyritter.com/GLOSSARY.HTM#Decimation). A tiny generalization in my humble view would be choosing elements from a sequence with a pr... 23 Dec 2009 13:51
Estimating entropy of a stream
Data examination, spectrum analysis and intimate knowledge of your randomness source is what is needed. Thus if you calculate 5 bits of randomness per sample, arithmetic says output 32 bits every 32/5 (round up to 7) times. Then double or triple that. I would go with 32 bits every 16 samples. //Do it like this ... 23 Dec 2009 13:51
Encryption & Authentication
Hi, ESP supports both 'encryption only' and 'authentication only' configurations. Interestingly, the the usage of encryption without authentication is strongly discouraged. So, why should ESP provide the support for 'encryption only' configuration ? Any specific reasons for that configuration ? Any ideas ? Thx ... 20 Dec 2009 22:22
Diffie Hellman Question
Not a cryptography expert, so please bear with me. I am trying to use Diffie Helman to solve an authenticated communication problem rather than an encryption problem. Bob needs to send some instructions to Alice. The instructions are very important for Alice so that she can figure out what to do next. However,... 6 Jan 2010 11:58
Public & Private Key
Since the private key cannot be derived from the public key in a PKI, I always assumed that the reverse was also true. However, looking at the way openssl rsautl command line generates a keypair - seems to be a 2 step process. 1st step is a private key & the second step is generation of the public key from the pri... 19 Dec 2009 07:18
Workshop “Medical Imaging Systems” within EUROMEDIA 2010 – Announce & Call for Papers
-------------------------------------------------------------------------------------------------------------------------------- Workshop “Medical Imaging Systems” within EUROSIS EUROMEDIA 2010 April 14-16, 2010, UPV Gandia, Gandia, Spain http://www.eurosis.org/cms/?q=node/1103 ---------------------------------... 15 Dec 2009 11:10
Call for Papers Reminder (extended): International MultiConference of Engineers and Computer Scientists IMECS 2010
CFP Reminder (extended): International MultiConference of Engineers and Computer Scientists IMECS 2010 From: IAENG - International Association of Engineers Draft Manuscript submission deadline (extended): 30 December, 2009 Camera-Ready papers & registration deadline: 10 January, 2010 IMECS 2010: 17-19 March, 201... 15 Dec 2009 03:33
Uncertainty in Privacy and Security @ IPMU 2010
Uncertainty in Privacy and Security ------------------------------------ http://www.iiia.csic.es/~guille/ipmu-security.html An special session within the International Conference on Information Processing and Management of ... 13 Dec 2009 06:41
SSL certificates and keys
My question is (apparently) simple, but I can't find a definitve answer. A SSL certificate, essentially, contains a public key bound to a subject, and the public key is signed by a CA. So clients receiving the certificate, that also recognize the CA, can validate the certificate. So far so good. But let's use... 30 Dec 2009 04:25
First  |  Prev |  Next  |  Last
Pages: 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53