NIST proposes software key escrow development

Ed Carp khijol!erc at apple.com
Sat Sep 18 20:15:39 PDT 1993


> Not necessarily. Zero knowledge proof techniques, for instance, can be
> applied to make source code as impenetrable as one wishes. This tends to
> carry a heavy runtime overhead, of course.

Could you go into more detail on this?  Thanks!
-- 
Ed Carp, N7EKG			erc at apple.com			510/659-9560
                            anon-0001 at khijol.uucp
If you want magic, let go of your armor.  Magic is so much stronger than
steel!        -- Richard Bach, "The Bridge Across Forever"





More information about the cypherpunks-legacy mailing list