Hello, I have a question regarding encrypted bloom filter protocols. I have
come to the understanding that I can use such protocols to allow a client to
query a server for the presence of a string, string. Due to the properties of
the encrypted bloom filter protocol, the server is incapable of
Never trust that the server delete data.
- Sent from my tablet
Den 21 jul 2012 11:15 skrev cryptoquesti...@safe-mail.net:
Hello, I have a question regarding encrypted bloom filter protocols. I
have come to the understanding that I can use such protocols to allow a
client to query a server for
On 07/20/2012 10:41 PM, cryptoquesti...@safe-mail.net wrote:
Hello, I have a question regarding encrypted bloom filter protocols. I have
come to the understanding that I can use such protocols to allow a client to
query a server for the presence of a string, string. Due to the properties
of
If you thought RdRand caused a lot of chatter on this list, we've just
announced a new sister instruction.. RdSeed.
It's here.. http://software.intel.com/file/45207
RdSeed is SP800-90B C and X9.82 parts 2 4 compliant in the XOR
construction. But they're all draft specs so things could change.