Begin forwarded message:
Date: Thu, 30 Oct 2008 16:38:29 -0400
From: "Jean-Philippe Aumasson" <[EMAIL PROTECTED]>
To: Multiple recipients of list <[EMAIL PROTECTED]>
Subject: SHA-3 lounge
Hi,
This is to announce the creation of a "SHA-3 lounge", at
http://131002.net/sha3lounge/
Best,
JP
Bill Stewart <[EMAIL PROTECTED]> writes:
>A quick google-look at ASICs showed a number in the range of 300K-20M gates,
>so hash-trees could probably get speedups of up to 20-100x if you can keep
>from becoming input-speed-bound. The 300K chips were about $6, 5M at $50 and
>350MHz, which is somewha
I've been working on a new electronic cash system that's fully
peer-to-peer, with no trusted third party.
The paper is available at:
http://www.bitcoin.org/bitcoin.pdf
The main properties:
Double-spending is prevented with a peer-to-peer network.
No mint or other trusted parties.
Participants
On Thu, 2008-10-30 at 16:32 +1300, Peter Gutmann wrote:
> Look at the XBox
> attacks for example, there's everything from security 101 lack of
> checking/validation and 1980s MSDOS-era A20# issues through to Bunnie Huang's
> FPGA-based homebrew logic analyser and use of timing attacks to recover de