Re: DJB challenge ;-)
From: Douglas A. Gwyn (DAGwyn_at_null.net)
Date: Fri, 12 Nov 2004 16:53:30 GMT
Francois Grieu wrote:
> The attacker running code at the user level in another process
> on the attacked machine is an entirely reasonable threat model.
Absolutely. Just because it might not be feasible to attack
a system through one constricted channel doesn't mean that
the cryptosystem is safe in other contexts. This "challenge"
doesn't even meet the sci.crypt FAQ criteria for challenges.