![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
X-Original-To: cryptography@metzdowd.com Date: Sun, 25 Aug 2013 15:12:16 -0400 From: "Perry E. Metzger" <perry@piermont.com> To: cryptography@metzdowd.com Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com For some research on communications privacy I'm doing at the moment, I'm interested in learning about the state of the art of DHT systems and mix network systems. I'd like to know both which systems are currently considered "state of the art" and what the state of the art is on attacks against such systems. Anyone care to shed some light? Pointers to literature are especially welcome, but anything that is just "in the folklore" is also clearly of use... Perry -- Perry E. Metzger perry@piermont.com _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
home | help | back | first | fref | pref | prev | next | nref | lref | last | post |