* Bryan McQuade wrote: >The goal here is to collect specific novel attacks (that is, attacks >not possible without this new information) that arise as a result of >resource timing. You seem to argue that "resource timing" is not novel, so any attack that depends on "resource timing" cannot be "novel". Could you re- phrase your question so this kind of petty argument can be ruled out? -- Björn Höhrmann · mailto:bjoern@hoehrmann.de · http://bjoern.hoehrmann.de Am Badedeich 7 · Telefon: +49(0)160/4415681 · http://www.bjoernsworld.de 25899 Dagebüll · PGP Pub. KeyID: 0xA4357E78 · http://www.websitedev.de/Received on Saturday, 8 October 2011 02:43:25 UTC
This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 20:26:19 UTC