picking a hash function to be encrypted
Florian Weimer
fw at deneb.enyo.de
Mon May 15 01:38:11 EDT 2006
* Travis H.:
> IIUC, protocol design _should_ be easy, you just perform some
> finite-state analysis and verify that, assuming your primitives are
> ideal, no protocol-level operations break it.
Is this still true if you don't know your actual requirements?
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list