[31906] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: NIST hash function design competition

daemon@ATHENA.MIT.EDU (Travis H.)
Fri Jul 21 08:48:37 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 21 Jul 2006 03:09:14 -0500
From: "Travis H." <solinym@gmail.com>
To: "Florian Weimer" <fw@deneb.enyo.de>
Cc: "Hal Finney" <hal@finney.org>, jamesd@echeque.com,
	cryptography@metzdowd.com
In-Reply-To: <87lkqohuaj.fsf@mid.deneb.enyo.de>

On 7/20/06, Florian Weimer <fw@deneb.enyo.de> wrote:
> Is this about Colin Percival's work?

The paper was by Dan Berstein; Percival's comments are specific to
hyperthreading, but I think djb's research showed that it's applicable
to non-HT architectures as well.
-- 
"Follow where reason leads" -- Zeno || Unix "guru" for rent or hire
http://www.lightconsulting.com/~travis/ -><-
GPG fingerprint: 9D3F 395A DAC5 5CCC 9066  151D 0A6B 4098 0C55 1484

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post