From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 47944fe5501350ac5c85e2a74a7ea756b793e5b058f9bb10f6690b95521f787d
Message ID: <199701240138.RAA03280@toad.com>
Reply To: N/A
UTC Datetime: 1997-01-24 01:38:52 UTC
Raw Date: Thu, 23 Jan 1997 17:38:52 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Thu, 23 Jan 1997 17:38:52 -0800 (PST)
To: cypherpunks@toad.com
Subject: GOO_gol
Message-ID: <199701240138.RAA03280@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Richard Crandall, NeXT scientist, writes eloquently on large
numbers in February SciAm. He cites cryptographic strength as
one result of research on the gargantuan googol and googolplex.
He reviews current work on sieve techniques for factorization
-- Quadratic, Number Field, Elliptic Curve Method and others --
as well as advanced algorithms. And exclaims:
Blaine Garst, Doug Mitchell, Avadis Tevanian, Jr., and I
implemented at NeXT what is one of the strongest -- if
not the strongest -- encryption schemes available today,
based on Mersenne primes. This patented scheme, termed
Fast Elliptic Encryption (FEE), uses the algebra of
elliptic curves, and it is very fast.
-----
GOO_gol
Thanks to PJP for pointing.
Return to January 1997
Return to “John Young <jya@pipeline.com>”
1997-01-24 (Thu, 23 Jan 1997 17:38:52 -0800 (PST)) - GOO_gol - John Young <jya@pipeline.com>