--
However, techniques that establish that the parties share a
weak secret without leaking that secret have been around
for years -- Bellovin and Merritt's DH-EKE, David Jablon's
SPEKE. And they don't require either party to send the
password itself at the end.
They are heavily
Tyler Durden [EMAIL PROTECTED] wrote:
Then again, if you're looking for sheer, brute performance and design cycle
times are not a limiting factor, ASICs are often the way to go. Even in a
Variola Suitcase, however, I'd bet some of the trivial functions are
off-loaded to an FPGA, though, for
Ah. You meant as a principal in general. Of course the prevailing wisdom is
to go from FPGAs to ASICs when you have heavy tasks.
In Telecom equipment, however, there's a few issues that basically 'require'
FPGAs.
First, the standards change quite a bit, depending on which area you're in.
For
Zooko writes:
I am about to accept an exciting job that will preclude me from
contributing to open source projects in the distributed file-system
space.
I will miss the Mnet project! Good luck without me!
Is there a network currently running? At one time, I had 5 gig of Mnet