Date: Fri, 13 May 2005 18:15:02 +0200 From: "Poul-Henning Kamp" <phk@phk.freebsd.dk> To: David Schultz <das@FreeBSD.ORG> Cc: freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory FreeBSD-SA-05:09.htt [REVISED] Message-ID: <63567.1116000902@critter.freebsd.dk> In-Reply-To: Your message of "Fri, 13 May 2005 12:07:14 EDT." <20050513160714.GB32677@VARK.MIT.EDU>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <20050513160714.GB32677@VARK.MIT.EDU>, David Schultz writes: >But isn't this a well-known and fundamental problem with SMT? Yes. The news being only the speed: you can get 300 bits of the 512 bit RSA key in a single observation of a single shot run of the crypto. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?63567.1116000902>