How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?
TCS,
633Post New Cryptography General Questions
What are the most important attacks on MACs ?
How do I find someone else's public key?
What are the advantages and disadvantages of public-key cryptography over secret-key cryptography?
What is SET ?
What is the factoring problem ?
Who issues certificates and how?
What is cryptanalysis ?
How do elliptic curve cryptosystems compare with other cryptosystems ?
What is SecurID ?
How does the Clipper chip work?
What are visual secret sharing schemes?
What is authentication? What is a digital signature?
Has factoring been getting easier?
What is shamirs secret sharing scheme?
What are the prospects for a theoretical breakthrough in the discrete log problem ?