Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Note that it is effectively the same attack as ECB byte-by-byte decryption, except using record length instead of repeated blocks as the signal.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: