Delayed self-encrypting messages

Jim choate ravage at bga.com
Sat Jun 11 15:45:38 PDT 1994


I would look at monitoring some large scale system that is not easily
modelled so it can't be predicted faster than it actualy occurs.

This way when the appropriate condition occurs its digitized state
could be used as a key.







More information about the cypherpunks-legacy mailing list