1997-01-24 - GOO_gol

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 47944fe5501350ac5c85e2a74a7ea756b793e5b058f9bb10f6690b95521f787d
Message ID: <199701240138.RAA03280@toad.com>
Reply To: N/A
UTC Datetime: 1997-01-24 01:38:52 UTC
Raw Date: Thu, 23 Jan 1997 17:38:52 -0800 (PST)

Raw message

From: John Young <jya@pipeline.com>
Date: Thu, 23 Jan 1997 17:38:52 -0800 (PST)
To: cypherpunks@toad.com
Subject: GOO_gol
Message-ID: <199701240138.RAA03280@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Richard Crandall, NeXT scientist, writes eloquently on large 
numbers in February SciAm. He cites cryptographic strength as
one result of research on the gargantuan googol and googolplex. 
He reviews current work on sieve techniques for factorization 
-- Quadratic, Number Field, Elliptic Curve Method and others -- 
as well as advanced algorithms. And exclaims:

   Blaine Garst, Doug Mitchell, Avadis Tevanian, Jr., and I
   implemented at NeXT what is one of the strongest -- if
   not the strongest -- encryption schemes available today,
   based on Mersenne primes. This patented scheme, termed
   Fast Elliptic Encryption (FEE), uses the algebra of
   elliptic curves, and it is very fast.

-----

GOO_gol


Thanks to PJP for pointing.







Thread