home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
X-Original-To: cryptography@metzdowd.com In-Reply-To: <D4800443-5C36-43A7-9A32-FFC5D9FE4C99@lrw.com> From: John Kelsey <crypto.jmk@gmail.com> Date: Wed, 27 Nov 2013 19:24:26 -0500 To: Jerry Leichter <leichter@lrw.com> Cc: "brk7bx@virginia.edu" <brk7bx@virginia.edu>, Cryptography <cryptography@metzdowd.com>, Arnold Reinhold <agr@me.com> Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com Are hardware trojans really a bigger practical threat than compromised software? --John _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
home | help | back | first | fref | pref | prev | next | nref | lref | last | post |