First  |  Prev |  Next  |  Last
Pages: 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41
Modes of operation
On 28 Jan 2010 13:27:33 GMT Thomas Pornin wrote: CBC, XTS... and pretty much all other modes begin to have trouble, security wise, when the amount of data to encrypt reaches about 2^(n/2) blocks, where blocks have n bits. If you use a 64-bit block cipher, then that threshold is 64*2^32 bits, i.e. about 32... 16 Mar 2010 18:36
Why is Kerberos ever used, rather than modern public key cryptography?
It's possible that I've misunderstood it, but Kerberos seems like a hassle in comparison to modern public key cryptography, and they seem to accomplish similar goals. Where is the distinction drawn? ... 12 Mar 2010 15:04
OAEP vs. PSS in PKCS#1
Why doesn't PKCS#1 just create signatures by encrypting the hash? Why have the Probabilistic Signature Scheme when you could just use Optimal Asymmetric Encryption Padding on the hash? The only thing I can figure is this: that OAEP could be used but because it has, embedded within it, a hash of the message, it re... 10 Mar 2010 16:27
commutative property of algorithms
On 2010-03-09, WTShaw <lurens1(a)gmail.com> wrote: According to the dictionary in my computer, "commutative" is a mathematical term involving the condition that a group of quantities connected by operators gives the same result whatever the order of the quantities involved. A rare usage is relating to or invo... 17 Mar 2010 09:06
Volume on Advanced Linear Cryptanalysis -- Contributions sollicited
On Mar 7, 3:08=A0am, Pascal Junod <pascal.ju...(a)heig-vd.ch> wrote: The volume will consist of a mix of invited contributions and of high- quality submissions on all aspects of linear cryptanalysis of block and stream ciphers, including, but not necessarily limited to the following topics: Sadly I h... 10 Mar 2010 08:35
Final: An obvious pattern found in the first 37Million Prime Sums using the log of the golden ratio Lp!
On Sun, 7 Mar 2010 14:18:33 -0800 (PST), bill <b92057(a)yahoo.com> wrote: On Mar 4, 12:54�pm, rom...(a)sbcglobal.net wrote: Subj: A regular pattern found in the first 37Million Prime Sums using the log of the golden ratio Lp! For example, the Table's last three Lp+3 steps are: Step:8975619 P... 9 Mar 2010 12:21
Unicity – A Dinosaur Discussion Not for Newbies.
.. I am promoting two new forms of cryptography i.e. ‘vector cryptography’ and ‘scalable key cryptography’ from my two websites called http://www.adacrypt.com and http://www.scalarcryptography.co.uk respectively. Both of these new crypto-types are drawing very great interest judging from the visitors to the sit... 10 Mar 2010 11:57
Call for papers: ISP-10, USA, July 2010
It would be highly appreciated if you could share this announcement with your colleagues, students and individuals whose research is in information security, cryptography, privacy, and related areas. Call for papers: ISP-10, USA, July 2010 The 2010 International Conference on Information Security and Privacy (... 7 Mar 2010 16:16
Enormous speed difference between C and ASM implementations ofcrypto algorithm
Tom St Denis wrote: On Mar 7, 6:40 am, Nomen Nescio <nob...(a)dizum.com> wrote: http://www.das-labor.org/wiki/AVR-Crypto-Lib/en I was stunned to see that the ASM (assembler) implementation of AES is more than ten times (!) as fast as the C implementation. I'd have thought that compiler technology h... 8 Mar 2010 08:35
When did Microsoft buy eBay? I seem to have missed that.
"Howard Schmidt, the US Cyber Czar who came directly from Microsoft..." <http://boycottnovell.com/2010/03/07/openssl-and-cyber-security-fud/> Schmidt left Microsoft in 2002 to return to government work (he had decades of government work before he went to MS in 1997), then went to eBay for several years, bef... 7 Mar 2010 11:49
First  |  Prev |  Next  |  Last
Pages: 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41