draft paper: "Deploying a New Hash Algorithm"
Steve Furlong
demonfighter at gmail.com
Thu Aug 4 10:23:55 EDT 2005
> [Moderator's note: ... attackers are often cleverer than protocol
> designers. ...
Is that true? Or is it a combination of
(a) a hundred attackers for every designer, and
(b) vastly disparate rewards: continued employment and maybe some
kudos for a designer or implementer, access to $1,000,000,000 of bank
accounts for an attacker
SRF
--
There are no bad teachers, only defective children.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list