Cypher secure versus computationally unbounded adversary

solman at MIT.EDU solman at MIT.EDU
Sat Dec 2 11:52:21 PST 1995


What I meant to say, was that the encryption protocol is secure versus
a computationally unbounded passive adversary AND REQUIRES NO PRIOR
COMMUNICATION.

Sorry 'bout that,

Jason W. Solinsky






More information about the cypherpunks-legacy mailing list