At 11:32 AM 5/2/2007, Perry E. Metzger wrote:

Anyone very familiar with AACS have ideas on what optimal attack and
defense strategies are? This seems like a fertile new ground for
technical discussion.

Ed Felton wrote and excellent piece on AACS from the technical and economic/tactical standpoint. This link is to the part that addresses your particular question:

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to