Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Humans Dominating Poker Super Computer (roboticstrends.com)

IoTdude writes: The Claudico super computer uses an algorithm to account for gargantuan amounts of complexity by representing the number of possible Heads-Up No-limit Texas Hold’em decisions. Claudico also updates its strategy as it goes along, but its basic approach to the game involves getting into every hand by calling bets. And it's not working out so far. Halfway through the competition, the four human pros had a cumulative lead of 626,892 chips. Though much could change in the week remaining, a lead of around 600,000 chips is considered statistically significant.

Submission + - Microsoft Releases Visual Studio Code Preview For Linux, OS X & 64-Bit Windo

ClockEndGooner writes: Microsoft is still extending its efforts into cross platform development with the release of a preview edition of Visual Studio Code, "a lightweight cross-platform code editor for writing modern web and cloud applications that will run on OS X, Linux and Windows." . Derived from its Monaco editor for Visual Studio Online, the initial release includes rich code assistance and naavigation for JavaScript, TypeScript, Node.js, ASP.NET 5, C# and many others.

Submission + - The 'Page 63' Backdoor to Elliptic Curve Cryptography 3

CRYPTIS writes: The security of Elliptic curve cryptography is facilitated by the perceived 'hard' problem of cracking the Discrete Logarithm Problem (DLP) for any given curve. Historically, for FIPS (Federal Information Processing Standards) compliance it was required that your curves conformed to the FIPS186-2 document located at http://csrc.nist.gov/publicati... . Page 63 of this specifies that the 'a' and 'b' elliptic curve domain parameters should conform to the mathematical requirement of c*b^2 = a^3 (mod p).

Interestingly, back in 1982, A. M. Odlyzko, of AT & T Bell Laboratories, published a document entitled “Discrete logarithms in finite fields and their cryptographic significance” ( http://www.dtc.umn.edu/~odlyzk... ). Page 63 of this document presents a weak form of the DLP, namely a^3 = b^2*c (mod p).

It seems then, that the National Institute of Standards and Technology (NIST), driven in turn by the NSA, have required that compliant curves have this potentially weak form of the DLP built in; merely transposing the layout of the formula in order to obtain what little obfuscation is available with such a short piece of text.

Comment Re:Tabs vs Spaces (Score 1) 428

I can virtually guarantee if you were inventing the first character set today, with no backward-compatibility constraints and no knowledge of the real world's history of keyboarding, you would not include a tab key.

An indentation level key. I think I would like that. Put it on the list. Scroll Lock on the other hand...

Comment I was never taught low-level bit-fiddling (Score 1) 637

I studied CS in the 80s. The first language was LISP. I don't think we were taught any language that required explicit memory management. We did learn, of course, how a computer works from the silicon level and up. On the other hand, it was impossible to do anything without learning C, so we learned C.

Comment Mandatory helmets in cars (Score 1) 1651

I believe that mandatory helmets for anyone riding in a car (driver and passengers) would reduce injuries much more than mandatory helmets for bicyclists. There are many more of them and they are going much faster. It would also be more convenient, since the helmets can simply be stored inside the car when the car is parked.

Slashdot Top Deals

One way to make your old car run better is to look up the price of a new model.

Working...