[146349] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[Cryptography] Implementations, attacks on DHTs, Mix Nets?

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Sun Aug 25 15:12:32 2013

X-Original-To: cryptography@metzdowd.com
Date: Sun, 25 Aug 2013 15:12:16 -0400
From: "Perry E. Metzger" <perry@piermont.com>
To: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

For some research on communications privacy I'm doing at the moment,
I'm interested in learning about the state of the art of DHT systems
and mix network systems. I'd like to know both which systems are
currently considered "state of the art" and what the state of the art
is on attacks against such systems.

Anyone care to shed some light? Pointers to literature are especially
welcome, but anything that is just "in the folklore" is also clearly
of use...

Perry
-- 
Perry E. Metzger		perry@piermont.com
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post