Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Even crypto algorithms rely on unproven assumptions for their security, even ignoring e.g. side-channel attacks.


Not true. Look up "resilience to information leakage".


I was talking more about cryptographic hardness assumptions such as the existence of one-way functions. Nevertheless, even in http://www.ccs.neu.edu/home/wichs/thesis.pdf, which was the first search result for that term, one of the first phrases is 'subject only to the constraint that the rate of leakage is bounded'.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: