home | log | search | bash | stats | wiki


Matches for Entropy, 516 total results Sorted by newest | relevance

Wed Feb 24 00:29:39 UTC 2016  <asciilifeform>   wait till they get to the part with 'entropy spreading'.

Mon Feb 15 23:44:07 UTC 2016  <BingoBoingo>   They exploded for good reason. Entropy tends to find a way.

Wed Feb 10 01:20:11 UTC 2016  <mircea_popescu>   i suspect it goes deeper than that. something something entropy/and/bandwidth

Sat Feb 06 20:42:28 UTC 2016  <mircea_popescu>   are we confusing entropy and bias here ?

Sat Feb 06 16:13:58 UTC 2016  <assbot>   Logged on 06-02-2016 15:33:16; asciilifeform: i never looked into what his entropy source is. if it's a prng, straight to hell.

Sat Feb 06 15:57:24 UTC 2016  <assbot>   Logged on 06-02-2016 15:33:16; asciilifeform: i never looked into what his entropy source is. if it's a prng, straight to hell.

Sat Feb 06 15:33:16 UTC 2016  <asciilifeform>   i never looked into what his entropy source is. if it's a prng, straight to hell.

Sat Feb 06 01:30:27 UTC 2016  <mircea_popescu>   what colors are your bits, bitch! and how much entropy is there in this dword ?

Sat Feb 06 01:30:08 UTC 2016  <mircea_popescu>   "256 bits has sufficient entropy to render any brute force attack, and even severe weakening (e.g. sq root effort attacks) utterly infeasible." << dude where the fuck do they come from.

Fri Feb 05 19:27:34 UTC 2016  <assbot>   Entropy Forum: Entropy's future, pullmoll am 09.7.2004 22:51 ... ( http://bit.ly/1X8SOhj )

Wed Feb 03 01:57:17 UTC 2016  <asciilifeform>   e.g., 1 and 2 imply that there are sufficient bits per entropy without having to resort to whitenings or distillation

Mon Feb 01 22:59:17 UTC 2016  <assbot>   Zotamedu comments on Bitcoin core will soon replace the industry standard random number generator with a homebrew script. Sorry for your loss (of entropy) ... ( http://bit.ly/1Q8QotN )

Mon Feb 01 18:25:15 UTC 2016  <mircea_popescu>   +/** Add entropy to the pool directly. Use this for seeding or on-demand entropy. */

Sun Jan 24 22:55:15 UTC 2016  <asciilifeform>   we actually don't have an algebra for entropy measures, other than shannon's

Sun Jan 24 22:48:57 UTC 2016  <mircea_popescu>   it is the direct equivalent of entropy-diddling for keysystems.

Fri Jan 22 01:07:20 UTC 2016  <mod6>   re: entropy topic, perhaps ya, we can do something like this when we have a crypto lib 'eh?

Fri Jan 22 01:03:54 UTC 2016  <mircea_popescu>   incidentally, and unrelatedly to the "magic numbers" avenue of trb improvement : one obvious anbd cheap hardening for trb would be to allow the user control of entropy source.

Tue Jan 05 04:15:50 UTC 2016  <ben_vulpes>   should i come up with my own hairbrained scheme to do so or ask how best to get entropy out of this rng directly from you?

Thu Dec 31 04:37:43 UTC 2015  <mircea_popescu>   quite exactly. it'd seem OpenSSL 1.0.1e-fips does not actually utilize entropy to generate keys.

Thu Dec 31 04:36:42 UTC 2015  <asciilifeform>   mircea_popescu: i dont think even my rng gives 4096*typical-miller-rabin-retries bits of entropy in 0.5s

« Previous Page    Next Page »