[cryptography] Design Strategies for Defending against Backdoors

Benjamin Kreuter brk7bx at virginia.edu
Mon Nov 18 20:28:23 EST 2013


On Mon, 18 Nov 2013 12:58:40 -0500
Thierry Moreau <thierry.moreau at connotech.com> wrote:

> Then you lose the better theoretical foundations of probabilistic 
> signature schemes ...

Deterministic signature schemes are not without their theoretical
merits e.g. Merkle trees.

-- Ben



-- 
Benjamin R Kreuter
KK4FJZ

--

"If large numbers of people are interested in freedom of speech, there
will be freedom of speech, even if the law forbids it; if public
opinion is sluggish, inconvenient minorities will be persecuted, even
if laws exist to protect them." - George Orwell
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: not available
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20131118/19427677/attachment.asc>


More information about the cryptography mailing list