On 2011/05/12, at 10:33, Ian Goldberg wrote:
>>> Remember also that if you have non-black-box access to the
>>> exponentiation routine, the server can compute X^y and X^b
>>> simultaneously. That will make a bigger difference in time, but is not
>>> really relevant from a spec-level standpoint.
>
2011/5/6 Björn Scheuermann :
[...]
> We implemented Tor's scheduling mechanisms, the N23 extension, and our
> fairness mechanism in an event-based network simulator (ns-3).
> Independent from the question of inter-circuit fairness, we were able to
> confirm the key findings in the DefenestraTor tec
On Wed, May 11, 2011 at 08:01:28PM -0400, Nick Mathewson wrote:
> On Wed, May 11, 2011 at 6:10 PM, Ian Goldberg wrote:
> [...]
> > Remember also that if you have non-black-box access to the
> > exponentiation routine, the server can compute X^y and X^b
> > simultaneously. That will make a bigger
On Wed, May 11, 2011 at 6:10 PM, Ian Goldberg wrote:
[...]
> Remember also that if you have non-black-box access to the
> exponentiation routine, the server can compute X^y and X^b
> simultaneously. That will make a bigger difference in time, but is not
> really relevant from a spec-level standp
On Wed, May 11, 2011 at 03:42:30PM -0400, Nick Mathewson wrote:
> RIght. If we can get away with something faster than HMAC_SHA256
> here, I'd love to move to it. SHA3 is right around the corner, and
> most of the candidates seem to allow better constructions for
> "tweakability" than HMAC.
>
>
On Wed, May 11, 2011 at 02:55:43PM -0500, Watson Ladd wrote:
> > Careful! The arguments to curve25519 are (output, exponent, base).
> > (Note the order; that confused me when we were coding up Sphinx.)
> > Presumably you meant for EXP(a,b) to mean a^b, though.
> >
> > Note that 9 does not have pri
On Fri, May 6, 2011 at 11:12 AM, Ian Goldberg wrote:
> [+ Douglas, Berkant]
>
BTW, apologies to Berkant for misspelling his name!
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Wed, May 11, 2011 at 1:19 PM, Ian Goldberg wrote:
> On Wed, May 11, 2011 at 01:33:17PM -0400, Nick Mathewson wrote:
>> On Fri, May 6, 2011 at 11:12 AM, Ian Goldberg wrote:
>> [...]
>> [...]
>
>> Set H(x,t) == HMAC_SHA256 with message x and key t. So H_LENGTH == 32.
>> Set t_mac == PROTO
On Wed, May 11, 2011 at 2:19 PM, Ian Goldberg wrote:
Thanks! I think the git version has most of the trivial stuff cleaned
up now (thanks for a patch from George Kadianakis). I've also made
notes for most of your suggestions.
> On Wed, May 11, 2011 at 01:33:17PM -0400, Nick Mathewson wrote:
On Wed, May 11, 2011 at 01:33:17PM -0400, Nick Mathewson wrote:
> On Fri, May 6, 2011 at 11:12 AM, Ian Goldberg wrote:
> [...]
> >> * I'm hoping to write this up as a proposed spec soon, unless Ian or
> >> somebody wants to give it a shot.
> >
> > Please go ahead.
>
> Here's a draft sketch tha
On Fri, May 6, 2011 at 11:12 AM, Ian Goldberg wrote:
[...]
>> * I'm hoping to write this up as a proposed spec soon, unless Ian or
>> somebody wants to give it a shot.
>
> Please go ahead.
Here's a draft sketch that I've put into proposals/ideas in the the
torspec repository. Please let me kn
11 matches
Mail list logo