From: sis2209@sisvax.sis.port.ac.uk (Agent Orange)
To: cypherpunks@toad.com
Message Hash: d06a3839deb713e16118bd3e648ff5322e2750d6c57b8c112da7ac14245f9a24
Message ID: <9404281114.AA18648@toad.com>
Reply To: N/A
UTC Datetime: 1994-04-28 11:14:20 UTC
Raw Date: Thu, 28 Apr 94 04:14:20 PDT
From: sis2209@sisvax.sis.port.ac.uk (Agent Orange)
Date: Thu, 28 Apr 94 04:14:20 PDT
To: cypherpunks@toad.com
Subject: questions.
Message-ID: <9404281114.AA18648@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Date sent: 28-APR-1994
I am currently getting together resources for a research paper on the
growth of encryption systems, from enigma to present day. Part of the
paper will examine the direction taken by encryption schemes in the
future (with particular reference to the likely acceleration of
computing power, greater need for personal privacy, etc etc)
The paper will be written from the viewpoint of an encryption-aware
programmer, rather than that of an expert cryptanalyst! Plenty of
example code and practical applications will form the backbone of this
study, not pages of mathematics.
Are there any papers currently circulating dealing with the future of
encryption? Has anyone else on this list already investigated this area,
I'd appreciate any information you can submit (ftp addrs?), via this
mailing list or private email if you wish.
Nick
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
System Operator of Psycho BBS, +44 483 418467 HST/v32bis
Archimedes and PC shareware sis2209@sisvax.sis.port.ac.uk
885Mb online huttonnc@axpvms.pa.dec.com
Return to April 1994
Return to “tcmay@netcom.com (Timothy C. May)”