| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAOLP8p7unW4spSA1zUBfVDuucjZrKAad0XxbbYH7K_hJj0yC4Q@mail.gmail.com> Date: Sun, 9 Feb 2014 14:38:49 -0500 From: Bill Cox <waywardgeek@...il.com> To: discussions@...sword-hashing.net Subject: Re: [PHC] multiply-hardening (Re: NoelKDF ready for submission) I downloaded the Sprial source for generating constant multiplications, and was able to get it to produce an equally good result in 4 levels and 7 add/subtract blocks. I had to run it several times with random seeds but it eventually found it. If I had to guess, the main difference between mine and theirs is I have access to a machine with 128GB of RAM :-) Well... also theirs does all kinds of cool stuff where mine is a quick hack. Bill
Powered by blists - more mailing lists