[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Cypher secure versus computationally unbounded adversary



Hi all,

I've just come up with a method for implementing and encryption algorithm
that is absolutely secure from passive attacks by a computationally
unbounded adversary. Is this a new capability, or am I reinventing the
wheel here?

Thanks,

Jason W. Solinsky