Post
Topic
Board Archival
Re: delete
by
Propulsion
on 19/09/2014, 03:11:15 UTC
2) There is no break down in the encryption but in how it is implemented.

If he is not bluffing, my hunch is probably correct. CN was never analyzed from the standpoint of the mathematical correlation of multiple intersecting rings. Rather the proof of security was for one ring in isolation.

I bet you will quickly find his exploit if you pursue my hunch.

Just out of curiosity, why the change of name to TheFascistMind?