Ocena wątku:
  • 0 Głosów - 0 Średnio
  • 1
  • 2
  • 3
  • 4
  • 5
30.09.2011, 17:40 (Ten post był ostatnio modyfikowany: 01.10.2011 1:30 przez kr2y510.)
Post: #1
Steganografia i kryptografia z pomocą bakterii
Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
08.10.2011, 7:20 (Ten post był ostatnio modyfikowany: 08.10.2011 16:04 przez Trigger Happy.)
Post: #2
RE: Ciekawostki
Paczka darmowych artykułów z kwartalnika Cryptologia.

Improved Related-key Attacks on DESX and DESX
Using Cartoons to Teach Internet Security
Accessible Voter-Verifiability
Reading Encrypted Diplomatic Correspondence: An Undergraduate Research Project
Algebraic Attacks on the Courtois Toy Cipher
From the Archives: The Last Bombe Run
Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s
Captured Kriegsmarine Enigma Documents at Bletchley Park
The Future of the Past—Questions in Cryptologic History
Oblivious Transfer Based on Key Exchange

Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
27.10.2011, 21:36
Post: #3
RE: Ciekawostki
Rządowy projekt z nagrodą 50000 $


Cytat:Today’s troops often confiscate the remnants of destroyed documents in war zones, but reconstructing them is a daunting task. DARPA’s Shredder Challenge calls upon computer scientists, puzzle enthusiasts and anyone else who likes solving complex problems to compete for up to $50,000 by piecing together a series of shredded documents.

The goal is to identify and assess potential capabilities that could be used by our warfighters operating in war zones, but might also create vulnerabilities to sensitive information that is protected through our own shredding practices throughout the U.S. national security community.
Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
03.11.2011, 19:50
Post: #4
RE: Ciekawostki

Cytat:Our immediate objectives are:

1. To raise worldwide awareness of the inherent dangers of surveillance technologies.
2. To seek redress for those who have suffered harm as a result of Western-manufactured surveillance technologies.
3. To secure undertakings from technology companies that they will comply with human rights principles in their future dealings with governments and intelligence agencies.

The longer-term objective of the project is to use Privacy International’s unique position as an international NGO based in the UK to effect a global shift in the way all surveillance technologies are developed, sold and used. By generating and shaping an international public debate about the specific threats posed by surveillance equipment in repressive regimes, we hope to prove a much broader point about how the political economy of surveillance affects the lives and infringes the civil liberties of millions of people all over the world. As the project matures, we will focus on provoking an industry-wide rethink of surveillance technology development and a shift towards balancing financial considerations with ethical ones.

Privacy International are looking for volunteers to help with its Big Brother Inc. project, an investigation into the sale of surveillance technology focusing on the sale of technologies to brutal and oppressive regimes intent on using them as tools of political control.

Privacy International szuka wolontariuszy ...
Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
04.11.2011, 13:37
Post: #5
RE: Ciekawostki

Cytat:The next generation of encryption technologies meets this need by using Elliptic Curve Cryptography (ECC) to replace RSA and DH, and using Galois/Counter Mode (GCM) of the Advanced Encryption Standard (AES) block cipher for high-speed authenticated encryption. Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz and Victor S. Miller in 1985. According to Cisco,"New algorithms for encryption, authentication, digital signatures, and key exchange are needed to meet escalating security and performance requirements".
Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
22.11.2011, 16:20
Post: #6
RE: Ciekawostki

Aż sobie zarezerwuje czas na to Smile Tylko brak u mnie "programming background" ...

Cytat: When does the class start?

The class will start in January 2012.
What is the format of the class?

The class will consist of lecture videos, which are broken into small chunks, usually between eight and twelve minutes each. Some of these may contain integrated quiz questions. There will also be standalone quizzes that are not part of video lectures, and programming assignments. There will be approximately two hours worth of video content per week.

Will the text of the lectures be available?

We hope to transcribe the lectures into text to make them more accessible for those not fluent in English. Stay tuned.
Do I need to watch the lectures live?

No. You can watch the lectures at your leisure.
Can online students ask questions and/or contact the professor?

Yes, but not directly There is a Q&A forum in which students rank questions and answers, so that the most important questions and the best answers bubble to the top. Teaching staff will monitor these forums, so that important questions not answered by other students can be addressed.
Will other Stanford resources be available to online students?

How much programming background is needed for the course?

The course includes programming assignments and some programming background will be helpful. However, we will hand out lots of starter code that will help students complete the assignments. We will also point to online resources that can help students find the necessary background.
What math background is needed for the course?

The course is mostly self contained, however some knowledge of discrete probability will be helpful. The wikibooks article on discrete probability should give sufficient background.
Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
24.11.2011, 13:57
Post: #7
RE: Ciekawostki
(22.11.2011 16:20)Trigger Happy napisał(a):  http://www.crypto-class.org/
Aż sobie zarezerwuje czas na to Smile Tylko brak u mnie "programming background" ...

Możesz spróbować kursu Zeda Shaw - Learn Python The Hard Way. Podobno dobrze wchodzi początkującym.

"Piove, governo ladro"
Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
25.11.2011, 18:38
Post: #8
RE: Ciekawostki
Skakałem po stronie NOP i znalazłem ciekawy link na temat praw kiedy zostaniemy zatrzymani. Warto przeczytać, bo nigdy nie wiadomo. Z własnego doświadczenia wiem, ze np. policja nie informuje wcześniej, że można odmówić zeznań a ma taki obowiązek.


Get the fuck off my property
derka, derka bakala, Muhammed Jihad!
Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
29.11.2011, 14:50
Post: #9
RE: Ciekawostki
Na pewno kiedyś było ale warto odświeżyć

The Crypto Anarchist Manifesto

Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
01.12.2011, 21:51
Post: #10
RE: Ciekawostki
Chcesz pracować w MI5 lub MI6 ? Wink

Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post

Skocz do:

Użytkownicy przeglądający ten wątek: 1 gości