From: gibo@ripco.com (Giles Bowkett)
To: cypherpunks@toad.com
Message Hash: 59b60fad4a1ee1feaecd3b9cb0ca3cd4867e2feb981380d0cbff31d5b5faf58e
Message ID: <v01530501acf1028a30f2@[192.0.2.1]>
Reply To: N/A
UTC Datetime: 1995-12-14 04:49:50 UTC
Raw Date: Thu, 14 Dec 1995 12:49:50 +0800
From: gibo@ripco.com (Giles Bowkett)
Date: Thu, 14 Dec 1995 12:49:50 +0800
To: cypherpunks@toad.com
Subject: Timing Attack Paper
Message-ID: <v01530501acf1028a30f2@[192.0.2.1]>
MIME-Version: 1.0
Content-Type: text/plain
I went to
http://www.cryptography.com/timingattack.html
and found the whole thing to be totally incomprehensible from
a layman's point of view. I apologize for having not read
"Applied Cryptography", which might have made the abstract a
simpler read - but even if I had I'd have been baffled by a
lot of the terminology and equations in this paper.
Can anyone post a brief summary which explains the essential
workings of the attack? I'd be very grateful.
--giles
===========================>>>http://pages.ripco.com/~gibo
as long as I shall stay alive
I never want a nine to five
-----BEGIN PBP SIGNATURE-----
Version: 1.0.0, Copyright 1995, Pretty Bad Privacy
Giles Bowkett
gibo@ripco.com
I am who I am because I say so. So there.
-----END PBP SIGNATURE-------
Return to December 1995
Return to ““Perry E. Metzger” <perry@piermont.com>”