[136433] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: combining entropy

daemon@ATHENA.MIT.EDU (Ben Laurie)
Wed Oct 29 09:20:22 2008

Date: Tue, 28 Oct 2008 21:37:48 +0000
From: "Ben Laurie" <benl@google.com>
To: "Leichter, Jerry" <leichter_jerrold@emc.com>
Cc: "John Denker" <jsd@av8n.com>, Cryptography <cryptography@metzdowd.com>,
        IanG <iang@systemics.com>
In-Reply-To: <Pine.SOL.4.61.0810281529040.25171@mental>

On Tue, Oct 28, 2008 at 7:55 PM, Leichter, Jerry
<leichter_jerrold@emc.com> wrote:
>        2.  The Byzantine model.  Failed modules can do anything
>                including cooperating by exchanging arbitrary
>                information and doing infinite computation.

So in the Byzantine model I can crack RSA?

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post