Hi again,
While reading the progress repot I also looked at the code of the
compiler to get a feeling for what it can and cannot do.
Please correct me if I'm wrong, but it seems to go through a number of
standard phases not related to cryptography. Then there are these
three phases:
Yes
Hi Martin,
I am confused about the notion of security via adversary traces
presented in those papers. It is described via two properties:
* Identity Property: a public state P can only lead to one other
public state P', regardless of the secret state.
* Commutative Property: computing on