On Wed, Sep 20, 2017 at 3:45 PM, Stephan Mueller <[email protected]> wrote:
> http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/Joux_comments.pdf

Section 3 shows an attack with repeated nonces, which we don't do here.

Section 4 shows an attack using a non-96-bit nonce, which we also don't do here.

Reply via email to