What are proactive security techniques ?
What are the prospects for a theoretical breakthrough in the discrete log problem ?
What are the most important attacks on MACs ?
Is the use of dsa covered by any patents?
What is seal?
What is shamirs secret sharing scheme?
What other stream ciphers are there?
Which cryptographic mechanism provides non-repudiation?
What is SecurPC ?
What happens if I lose my private key?
What is DNA computing ?
How does the Clipper chip work?
What are the shrinking and self-shrinking generators?
What is a compression function?
Which is easier, factoring or discrete log?