Hacker News new | past | comments | ask | show | jobs | submit login

FTA:

> Traditionally, information-theoretic analyses of secure schemes have assumed that the source files are perfectly uniform. In practice, they rarely are, but they’re close enough that it appeared that the standard mathematical analyses still held.

After reading your comment, I'm confused. Are they talking about the entropy of the key or of the plaintext?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: