Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

From a cursory read of the PDF [1], it would seem that Mr. Nash was describing a stream cipher [2].

[1] http://courses.csail.mit.edu/6.857/2012/files/H03-Cryptosyst...

[2] http://en.wikipedia.org/wiki/Stream_cipher



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: