attacks that involved running chips at lower voltage than they were
supposed to have and that somehow allowed them to be compromised, etc.
Anyhow, are there any (not *too* technical) books on the modern
techniques for attacking cryptosystems?
Thanks. /bernie\
--
Bernie Cosell
these
days?
/Bernie\
--
Bernie Cosell Fantasy Farm Fibers
mailto:ber...@fantasyfarm.com Pearisburg, VA
-- Too many people, too few sheep --
___
The cryptography mailing list
cryptography@metzdowd.com
http
could hide the nasty stuff behind the second passsword, a ton of innocent
stuff behind the first password and just give them the first password
when asked. In practice, I dunno if it really works or will really let
you slide by.
/Bernie\
--
Bernie Cosell Fantasy Farm
was under the impression that ANI was harder to spoof than CallerID is.
/Bernie\
--
Bernie Cosell Fantasy Farm Fibers
mailto:ber...@fantasyfarm.com Pearisburg, VA
-- Too many people, too few sheep
and the authentication
[be it a cookie or form vbls] comes later.
/bernie\
--
Bernie Cosell Fantasy Farm Fibers
mailto:ber...@fantasyfarm.com Pearisburg, VA
-- Too many people, too few sheep