For some research on communications privacy I'm doing at the moment,
I'm interested in learning about the state of the art of DHT systems
and mix network systems. I'd like to know both which systems are
currently considered "state of the art" and what the state of the art
is on attacks against such systems.

Anyone care to shed some light? Pointers to literature are especially
welcome, but anything that is just "in the folklore" is also clearly
of use...

Perry E. Metzger      
The cryptography mailing list

Reply via email to