home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
X-Original-To: cryptography@metzdowd.com Date: Wed, 06 Nov 2013 14:20:19 -0500 From: Kent Borg <kentborg@borg.org> To: Steven Bellovin <smb@cs.columbia.edu> In-Reply-To: <AF124B60-7200-460B-8E47-559F5C469CDC@cs.columbia.edu> Cc: cryptography@metzdowd.com Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com On 11/06/2013 02:13 PM, Steven Bellovin wrote: > What makes you think that purely random parameters are good? Sometimes > they aren't -- think s-boxes. Yes, only when they are. -kb, the Kent who was only noting that some free association starting from Schneier can easily lead back to Schneier. P.S. I didn't say where the article was: https://www.schneier.com/ http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
home | help | back | first | fref | pref | prev | next | nref | lref | last | post |