--- begin forwarded text
From: Dov Smith <[EMAIL PROTECTED]>
To: ZKS Press Releases <[EMAIL PROTECTED]>
Subject: [Zero-Knowledge Press Release] ZERO-KNOWLEDGE SYSTEMS
SECURES $12M IN CAPITAL FUNDING
Date: Thu, 30 Sep 1999 10:33:55 -0400
Sender: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
==
[This is basically just a rant. If that's not what you want to read, I
suggest skipping it. --Perry]
--- begin forwarded text
Date: Thu, 30 Sep 1999 09:30:54 -0400
Reply-To: Law & Policy of Computer Communications
<[EMAIL PROTECTED]>
Sender: Law & Policy of Computer Communications
<[
At the risk of being flamed for being a hopeless newbie, or perhaps as
one asking a practical question about export regs, (something that seems
in bad taste lately) I will nevertheless proceed:
Are hash functions (MD5 specifically) controlled by export regs?
Of course I know that any answer is s
US Patent Number 5956404
http://www.patents.ibm.com/details?pn=US05956404__
Schneier, Bruce
Kelsey, John
Abstract:
A method for digitally signing a message by a tamper-resistant device to
generate a digital signature. The method includes the step of hashing the
message to form message bits; an
Keith Dawson[SMTP:[EMAIL PROTECTED]] writes:
>Sent: Thursday, September 30, 1999 9:00 AM
>Subject: Rumor of a working quantum computer
>To:[EMAIL PROTECTED]
>Anyone heard word on this rumor? The Sunday Times story claims
>that a European Institute of Quantum Computing Network has
A commonly-held conception in the commercial world (in my experience) is that
most threats to "corporate security" come from the Internet-at-large, and
therefore being behind a firewall is a Good Thing and generally Sufficient.
Of course there are many references in the literature which dispute
--- Start of forwarded message ---
Message-Id: <[EMAIL PROTECTED]>
From: "NewsScan" <[EMAIL PROTECTED]>
To: "Multiple recipients of list newsscan <[EMAIL PROTECTED]>" <[EMAIL PROTECTED]>
Date: Fri, 01 Oct 1999 06:10:52 -0700
Subject: NewsScan Daily, 1 October 1999 ("Above The Fold")
Repl