17 Dec
2003
17 Dec
'03
11:17 p.m.
This thread definitely belongs as cypherpunks, as the whole point of the discussion is to debate the limits of what cryptography on its own can achieve. What do you need as well as crypto before you can remove all firewalls? Simon (defun modexpt (x y n) "computes (x^y) mod n" (cond ((= y 0) 1) ((= y 1) (mod x n)) ((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n)) (t (mod (* x (modexpt x (1- y) n)) n))))