bram (bram@gawth.com)
Tue, 14 Jul 1998 21:11:24 -0700 (PDT)
On Tue, 14 Jul 1998, Bill Frantz wrote:
> In any case, one of the assumptions is that the machine is not hacked so it
> is hard to see how these malicious attackers get access to the PRNG API.
Ah, but that's specific to your application. Might as well analyze how
well the algorithm would hold up in other circumstances while studying it.
-Bram
The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:20:24 ADT