On 6/10/12 8:03 PM, Oliver Pinter wrote:
On 6/11/12, RW wrote:
On Mon, 11 Jun 2012 00:37:30 +0200
Oliver Pinter wrote:
16 rounds in 2012? It is not to weak?!
It's hard to say. Remember that blowfish was designed as a cipher not
a hash. It's designed to be fast, but to still resist known plai
On Thu, 28 Jan 2010, Mike Andrews wrote:
On 1/28/10 3:18 PM, Chris Palmer wrote:
For backwards compatibility, which do people prefer: Creating a new $N$
prefix every time we re-tune the algorithm, or using a new notation to say
how many times this password was hashed? For example: $1.1000
On 1/28/10 3:18 PM, Chris Palmer wrote:
For backwards compatibility, which do people prefer: Creating a new $N$
prefix every time we re-tune the algorithm, or using a new notation to say
how many times this password was hashed? For example: $1.1000$, $1.10$,
et c.?
I prefer the latter. It ca
r nameserver is attacking them. Same
story -- a slow DNS lookup that takes longer than their firewall is
willing to wait on a UDP response, and they assume that every single
thing a firewall logs is from an OMG WTF DDOS script kiddie... :)
--
Mike Andrews * [EMAIL PROTECTED] * http://www.b