Hacker News new | past | comments | ask | show | jobs | submit login

That was the first attack. How about the second attack where they show how to encrypt a bitstream?



See my reply in the sibling comment thread. Basically, the second attack is not possible without the first succeeding.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: