Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is brilliant. But since we are often told that composing cryptographic promitives can turn out to be unexpectedly dangerous, can you point me to some articles where this technique is studied in more detail? Preferably by experts such as yourself.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: