Skip to content

Instantly share code, notes, and snippets.

@RolandCroft
Created May 20, 2018 15:32
Show Gist options
  • Save RolandCroft/2b90fa57cb7aea6fcd9555e7dcfdf9cf to your computer and use it in GitHub Desktop.
Save RolandCroft/2b90fa57cb7aea6fcd9555e7dcfdf9cf to your computer and use it in GitHub Desktop.
explain repudi i dont understand thi if as it say here the recipi or in fact anyon els could have comput an ident valu arent we back at simpl hash function and therefor no at allor somewhat more gener if someon els could have sign the messag they can sign it now but then by definit the sign algorithm is broken see what do i miss whatev it is id argu that it need to be explain
explain diffus and confus for block cipher
fulldisk encrypt tptacek blog ha some good sure if thi should be under complet or not
audit for of earth solar and sun i have rule
gener and simplifi encodedecod in issu on the hotthott i propos a of theorem but that issu wa meant to be for the book project ill restat it a be a type let r a a type be a relat let rho pixa rxx be a proof of reflex let f pixya piprxi xy be a proof thar r impli and let h pixya piprxi fprhoxp then rxi is equival to xy for all xy in athi theorem could be given as an exercis becaus the proof is practic the same as the proof of proofth equival is go to be f itself sinc f is an equival if and onli if it induc an equival on total space theorem it suffic to prove that sigmaya rxi is contract for each xa as center of contract take the pair xrhox now assum we have a pair yp for which we want to show xrhoxyp we have fp xy and hp fprhox p qed is a direct corollari of thi mike then ask what kind of applic i had in mind one thing wa that it could be use to construct a left adjoint to the functor a aidarefl from type into reflex typevalu relat anoth is that it simplifi the encodedecod method the concret way in which it doe thi is that item iv lemma is an unnecessari requir provid that item iii is assum for c in an arbitrari fiber
formul main theorem for univers termin
been mercilessli prune detail from the tsp descript billworri you wont like the reduc descript of tsp in thi draft now space ha to be made for the extra discuss point demand by the review but i would not be surpris if you start ad back some of the cull detail
correct on page inord travers first off thank you for an excel resourc great workwhat step will reproduc the problem brows to page of pdf copi see the paragraph about inord is the expect output what do you see instead i see given a binari tree t have at least one vertex inord travers first visit the root of t and consid it left and right children we then recurs appli inord travers to the left and right subtre of the root vertex shouldnt it be someth like given a binari tree t have at least one vertex inord travers recurs travers the leftsubtre of the root the root of t and then it right subtreewhat version of the product are you use on what oper system r which is the latest as of pleas provid ani addit inform below noneorigin issu report on by kedarmhon oct at
tcpserver what is the public key if the connect wa refus onor invalid connectionid if refusedfound at column what is the public key if the connect wa refus
tcpserver can the first packet be ani random packet like cooki request handshak node respons onif it wa a ping send a pong at column can the first packet be ani random packet like cooki request handshak node respons etc
tcpserver in most of the you use encrypt with x and y and z to mean onencrypt with the public key of the client and privat key of the server and the noncefound at column in most of the you use encrypt with x and y and z to mean messag append to z encrypt with y and sign with x or similar here it invert encrypt with y and x and z it would be good to stick to one order to minimis confus and perhap explain what the sentenc actual mean
tcpserver what is the valu of thi nonc compar to the unencrypt nonc sent after the public key onit also contain a base noncefound at column what is the valu of thi nonc compar to the unencrypt nonc sent after the public key are they both complet random if so what random sourc is use if not how are they gener
tcpserver is thi base nonc in ani way relat to the receiv base nonc or ani other nonc in the onbas nonc we want the client to usefound at column is thi base nonc in ani way relat to the receiv base nonc or ani other nonc in the protocol
tcpserver is it encrypt with the dht privat key or the long term privat onencrypt with the privat key of the clientfound at column is it encrypt with the dht privat key or the long term privat key
tcpserver what is the reason for a base nonc also can you explain what exactli a base nonc onbas nonc we want the server to usefound at column what is the reason for a base nonc also can you explain what exactli a base nonc is
all doc except netcrypto add newlin to packet spec pleas add some line break befor in packet it littl effort and help readabl a lot
netcrypto ensur that name are consist eg pingid or echoid vs number unless thi onnumb must be sent back untouch in cooki at column ensur that name are consist eg pingid or echoid vs number unless thi number actual serv a differ purpos in which case there may be a better name than number
netcrypto pleas avoid thi redund by abstract out the cooki protocol basic onencrypt messag is encrypt with sender dht privat key receiv dht public key and the noncefound at column pleas avoid thi redund by abstract out the cooki protocol basic redund mean i need to manual check that the same key are use for both packet becaus i must by default assum they are differ
netcrypto whi is thi inform sent earlier in the document we establish that they are alreadi onsend real public key bytessend dht public key bytesfound at column whi is thi inform sent earlier in the document we establish that they are alreadi known
netcrypto how mani key doe an attack need to pregener to do an effect do on a singl onsimpl packet floodfound at column how mani key doe an attack need to pregener to do an effect do on a singl user
cryptocor how are nonc gener onrandom noncefound at column what random sourc is thi nonc gener from
netcrypto you mean the peer who sent the onif it wa receiv from a tcp oob packet it must be sent back by a tcp oob packet via the same relay with the destin be the peer who sent the at column you mean the peer who sent the request
netcrypto a tcp like not at the network level but at the netcrypto level which onwork over udp it must account for possibl packet loss packet arriv in the wrong order and ha to implement some kind of congest controlfound at column a tcp like not at the network level but at the netcrypto level which level is thi packet loss cope mechan implement at
netcrypto whi is it possibl to send it via anoth link what happen if you onth cooki respons must be sent back use the exact same link the cooki request packet wa sent fromfound at column whi is it possibl to send it via anoth link what happen if you do
netcrypto where is thi inform onthi inform is knownfound at column where is thi inform store
discuss signific result in dispers chapter sim beta df p but order of pinvas doe not increas or decreas with betamaybs post hock test and discussor run more sim here
can size return a sign type in size return the unsign type sizet can it instead return a sign type thi would be consist with the statement in b where we have although sensibl from a sound point of view the author of thi paper feel thi is potenti a rich sourc of confus thi paper hew closer to the current standard by have onli one associ type and requir it to be signedi wa hope that stl might address the problem in the exist stl where vecend vecbegin compar an unsign integ to a sign integerdo you have pointer to prior discuss on thi topic
portfolio secur layout current the stock price is sometim cut off by the chang need to decid on layout for each
creat arith test that have sign valu
add method to secur includ file with sensit info it would be nice to be abl to transfer my ssh dir also still dont have the unison in although that less of a secur risk
vi undersg intro til hvorfor det er ndvendigt at analyser web framework find en kild der siger at der bliver lavet fejl
preparar o guia de administrao do ldap proxi preparar o guia de administrao do ldap no guia instru de instalao do barramento habilitar e configurar o processo ldap verificar as configura para o proxi ldap exemplo de configurao de client sei redmin ldapsearch cdigo php etc
decrypt a block use the oracl typo pdf page the attack start by send in a plaintext a that just one byte shorterthan the block sizein the figur below unnumb input appear to show a length byte greater than block length
overview three area in usertous the area of that we are interest in can be divid into these categori usertous through machin
add differ adversari model discuss passiv and activ adversari malici and palmskog on the topic can be interest
signatur
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment