draft paper: "Deploying a New Hash Algorithm"

Steve Furlong demonfighter at gmail.com
Thu Aug 4 10:23:55 EDT 2005


> [Moderator's note: ... attackers are often cleverer than protocol
> designers. ...

Is that true? Or is it a combination of

(a) a hundred attackers for every designer, and
(b) vastly disparate rewards: continued employment and maybe some
kudos for a designer or implementer, access to $1,000,000,000 of bank
accounts for an attacker


SRF

-- 
There are no bad teachers, only defective children.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list