[14447] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: anonymous DH & MITM

daemon@ATHENA.MIT.EDU (Zooko O'Whielacronx)
Fri Oct 3 13:17:44 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: 2 Oct 2003 17:56:03 -0400
From: "Zooko O'Whielacronx" <zooko@zooko.com>
To: "bear" <bear@sonic.net>
Cc: "Ian Grigg" <iang@systemics.com>,
	"M Taylor" <mctylr@privacy.nb.ca>,
	"Cryptography list" <cryptography@metzdowd.com>
In-Reply-To: Message from bear <bear@sonic.net> 
   of "Thu, 02 Oct 2003 14:16:51 PDT." <Pine.LNX.4.58.0310021356540.30341@bolt.sonic.net> 


> Perhaps I spoke too soon?  It's not in Eurocrypt or Crypto 84 or 85,
> which are on my shelf.  Where was it published?

R. L. Rivest and A. Shamir. How to expose an eavesdropper. Communications of the ACM, 27:393-395, April 1984.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post