Am 31.03.2012 04:23, schrieb Landon Hurley:
Does anyone have any knowledge of academic papers focused on
methods of detecting whether a crypto scheme has been compromised
in situ or on how to utilize intelligence gleaned from compromised
cipher texts without giving away that compromise to the
On 30 March 2012 22:23, Landon Hurley ljrhur...@gmail.com wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Does anyone have any knowledge of academic papers focused on methods
of detecting whether a crypto scheme has been compromised in situ or
on how to utilize intelligence gleaned
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Does anyone have any knowledge of academic papers focused on methods
of detecting whether a crypto scheme has been compromised in situ or
on how to utilize intelligence gleaned from compromised cipher texts
without giving away that compromise to the
On 31/03/12 13:23 PM, Landon Hurley wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Does anyone have any knowledge of academic papers focused on methods
of detecting whether a crypto scheme has been compromised in situ or
on how to utilize intelligence gleaned from compromised cipher
I'm thinking in terms of scenarios like how could the Nazis have
methodologically shown Enigma's compromise in a systematic manner; the
converse as well though: has there been research into scenarios
similar to the Allies and Enigma (i.e. how to not give the game away),
or has it all just