--- a/slides.sty Tue Sep 30 11:34:21 2014 +0100
+++ b/slides.sty Tue Sep 30 12:44:16 2014 +0100
@@ -9,6 +9,7 @@
\setmonofont[Scale=.88]{Consolas}
\newfontfamily{\consolas}{Consolas}
+
\definecolor{darkblue}{rgb}{0,0,0.6}
\hypersetup{colorlinks=true}
\hypersetup{linkcolor=darkblue}
Binary file slides/slides02.pdf has changed
--- a/slides/slides02.tex Tue Sep 30 11:34:21 2014 +0100
+++ b/slides/slides02.tex Tue Sep 30 12:44:16 2014 +0100
@@ -17,6 +17,8 @@
% first cyber attack
%http://investigations.nbcnews.com/_news/2013/03/18/17314818-cyberattack-on-florida-election-is-first-known-case-in-us-experts-say
+\newcommand{\bl}[1]{\textcolor{blue}{#1}}
+
\begin{document}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -125,8 +127,9 @@
\begin{itemize}
\item in Unix systems: \texttt{hash(salt + password)}, or even
-\texttt{hash$^{\texttt{1500}}$(salt + password)}
-
+\texttt{hash$^{\texttt{1500}}$(salt + password)}\smallskip\pause
+\item Bruce Schneier in cases messages are long: \\
+instead of \texttt{m $\mapsto$ hash(m)},\\ use \texttt{m $\mapsto$ hash(hash(m) + m)}
\end{itemize}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -145,6 +148,19 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\begin{frame}[c]
+\frametitle{E-Voting}
+
+\begin{bubble}[9cm]
+``Any electronic voting system should provide at least the same
+security, privacy and transparency as the system it replaces.''
+\end{bubble}
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{frame}[t]
\frametitle{Voting as Security Problem}