Useful references are http://cr.yp.to/antiforgery/cachetiming-20050414.pdf -- the Bernstein paper www.wisdom.weizmann.ac.il/~tromer/papers/cache.pdf - related work by Eran Tromer.
William > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Travis H. > Sent: Friday, July 21, 2006 9:09 AM > To: Florian Weimer > Cc: Hal Finney; [EMAIL PROTECTED]; cryptography@metzdowd.com > Subject: Re: NIST hash function design competition > > On 7/20/06, Florian Weimer <[EMAIL PROTECTED]> wrote: > > Is this about Colin Percival's work? > > The paper was by Dan Berstein; Percival's comments are specific to > hyperthreading, but I think djb's research showed that it's applicable > to non-HT architectures as well. > -- > "Follow where reason leads" -- Zeno || Unix "guru" for rent or hire > http://www.lightconsulting.com/~travis/ -><- > GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 > > --------------------------------------------------------------------- > The Cryptography Mailing List > Unsubscribe by sending "unsubscribe cryptography" to > [EMAIL PROTECTED] > --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]