User contributions for 67.119.195.43
For 67.119.195.43 talk block log logs filter log
6 March 2009
- 06:4206:42, 6 March 2009 diff hist −15 MD5 →History and cryptanalysis: The WHIRLPOOL function didn't exist in 1996, so cryptographers weren't recommending it back then
4 March 2009
- 06:0706:07, 4 March 2009 diff hist +25 Amazon Kindle →Content: note that Kindle 2 doesn't have SD slot here, too
3 March 2009
- 20:5020:50, 3 March 2009 diff hist +267 Cryptographic hash function →Merkle-Damgård construction
- 20:4720:47, 3 March 2009 diff hist +54 Cryptographic hash function →Concatenation of cryptographic hash functions: more precision! can never have too much precision!
- 20:4420:44, 3 March 2009 diff hist +103 Cryptographic hash function →Concatenation of cryptographic hash functions: move some details to the references section
- 20:2220:22, 3 March 2009 diff hist +199 Cryptographic hash function →Concatenation of cryptographic hash functions: fix {{fact}}, try to add detail and clarify attack against concatenated functions (may be too detailed)
- 00:0800:08, 3 March 2009 diff hist −27 NIST hash function competition No edit summary
1 March 2009
- 08:2508:25, 1 March 2009 diff hist +1,170 Wikipedia:Village pump (technical) →Special:Export rate limits?: new section
26 February 2009
- 22:4222:42, 26 February 2009 diff hist −2 Google App Engine →Differences from other application hosting
- 22:4122:41, 26 February 2009 diff hist −46 Google App Engine →Differences from other application hosting
- 22:3422:34, 26 February 2009 diff hist +252 Google App Engine various changes re: billing, more explanation of differences from other app hosting
- 22:2322:23, 26 February 2009 diff hist +457 Google App Engine →Free quotas: explain billing
- 22:1422:14, 26 February 2009 diff hist −1 Google App Engine →Hard limits: fix
- 22:1422:14, 26 February 2009 diff hist +74 Google App Engine →Hard limits
- 22:0822:08, 26 February 2009 diff hist +1 Google App Engine →Fixed quotas
- 22:0822:08, 26 February 2009 diff hist +15 Google App Engine →Per-day usage quotas: reflect new pricing scheme
25 February 2009
- 20:3420:34, 25 February 2009 diff hist −249 Google App Engine No edit summary
- 20:3320:33, 25 February 2009 diff hist −128 Google App Engine No edit summary
- 08:5908:59, 25 February 2009 diff hist +8 Google App Engine →Differences from traditional application hosting: tweaks
- 08:5408:54, 25 February 2009 diff hist +409 Google App Engine →Differences from traditional application hosting: VM setups are "traditional" if your father used them and his father before him.
18 February 2009
- 19:4719:47, 18 February 2009 diff hist −125 Chroot →Uses
13 February 2009
- 18:4718:47, 13 February 2009 diff hist +74 Advanced Encryption Standard →Security: fix {{fact}} by noting that NSA's type 1 algorithms have 160-bit keys and requirement of 192/256-bit keys may just be for parity with them
- 18:3918:39, 13 February 2009 diff hist −55 Advanced Encryption Standard →Security: tighten sentence
- 18:3518:35, 13 February 2009 diff hist +379 Advanced Encryption Standard →Security
8 February 2009
- 23:0923:09, 8 February 2009 diff hist +36 RC4 No edit summary
2 February 2009
- 22:1022:10, 2 February 2009 diff hist +1,427 Talk:SHA-1/Archive 1 →Your opinion: is this useless fancruft?: new section
- 05:0305:03, 2 February 2009 diff hist +154 SHA-1 →SHA-2 family
- 04:5304:53, 2 February 2009 diff hist +1,565 Talk:Cryptographic hash function →Randomized hashing, 2008 MD5 SSL cert break: new section
- 04:3104:31, 2 February 2009 diff hist −281 Cryptographic hash function →Concatenation of cryptographic hash functions
- 04:3004:30, 2 February 2009 diff hist +94 Cryptographic hash function →Use in building other cryptographic primitives: SEAL not guaranteed to be as good/bad as SHA-1
- 04:2104:21, 2 February 2009 diff hist +352 Cryptographic hash function →Use in building other cryptographic primitives: clarify that some hash function->block cipher constructs (Luby-Rackoff) are provably good, others (SHACAL) not
- 04:0204:02, 2 February 2009 diff hist +100 Cryptographic hash function →List of cryptographic hash functions: mention SHA-3
- 03:5803:58, 2 February 2009 diff hist +129 Cryptographic hash function →Concatenation of cryptographic hash functions: notable point i hadn't seen argued before -- clarify it a bit, though
- 03:1703:17, 2 February 2009 diff hist +7 SHA-1 →SHA-2 family: since NSA developed SHA-2, there's obviously non-public analysis
1 February 2009
- 03:1703:17, 1 February 2009 diff hist +10 Supreme Court of the United States →Confirmation: belief that long confirmation is for political reasons is arguable but more than "speculation", and we only have to qualify the sentence once :)
28 January 2009
- 20:5920:59, 28 January 2009 diff hist +692 Talk:International Technology Roadmap for Semiconductors →How did tech roadmaps come to be?: new section
- 08:1408:14, 28 January 2009 diff hist +488 SHA-1 →SHA-2 family: Awesome? Yes. Notable? Other editors will decide.
- 07:5107:51, 28 January 2009 diff hist −375 SHA-1 →SHA-2 family: SHA-2 is the standard name (used by NIST in the sha-3 call for algorithms), and correct what it says about the analysis
- 00:2900:29, 28 January 2009 diff hist +53 Triple DES →Usage
- 00:2500:25, 28 January 2009 diff hist +7 Cryptography →Symmetric-key cryptography: typo!
- 00:2500:25, 28 January 2009 diff hist −69 Cryptography →Symmetric-key cryptography: shorter!
27 January 2009
- 22:0222:02, 27 January 2009 diff hist +231 Cryptography →Symmetric-key cryptography: the similarity/long-term confidence thing may not represent consensus -- this is painful wording but well-supported
- 21:5121:51, 27 January 2009 diff hist +252 Cryptography →Symmetric-key cryptography: MD5 is broken, flesh out the SHA saga a bit more, clear up some prose
- 03:0403:04, 27 January 2009 diff hist −113 Clickjacking add headings, mention frame-killing JS
25 January 2009
- 08:5508:55, 25 January 2009 diff hist +557 Talk:Random number generation →Entropy vs. unpredictability to an attacker: more thinking out loud!
- 03:0603:06, 25 January 2009 diff hist +20 Template:Cryptography hash try separating the most-used funcitons from the rest -- we'll see if folks like this or reverse it :)
- 02:5202:52, 25 January 2009 diff hist +68 MD5 note just how broken MD5 is
- 02:4702:47, 25 January 2009 diff hist +221 Template:Cryptography stream reorganize: standardized and widely used ciphers up top, others below
- 02:2202:22, 25 January 2009 diff hist +163 RC4 more attacks than i'd known about
24 January 2009
- 09:2209:22, 24 January 2009 diff hist +261 BATON what kind of wacky design is "highly parallelizable" (the complete opposite of skipjack) and apparently works on three OR four 32-bit words? we won't know 'til too many years pass for us to care.