I'm looking for a list of common implementation flaws in DH. Things like: How to check the key the other side sends, what are acceptable values for p, etc?
Any pointers?
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
