Steven Bellovin <s...@cs.columbia.edu> writes: >Does anyone know of any (verifiable) examples of non-government enemies >exploiting flaws in cryptography?
Could you be a bit more precise about what "flaws in cryptography" covers? If you mean exploiting bad or incorrect implementations of crypto then there's so much that I barely know where to start, if it's actual cryptanalytic attacks on anything other than toy crypto (homebrew ciphers, known-weak keys, etc) then there's very little around. If it's something else, you'd have to let us know where the borders lie. Peter. _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography