Changes between Initial Version and Version 1 of Ticket #12980, comment 4


Ignore:
Timestamp:
Aug 30, 2014, 2:49:53 AM (5 years ago)
Author:
NickHopper
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #12980, comment 4

    initial v1  
    1010
    1111
    12 I only see one place t is used other than in the derivation of s_t, in the derivation of the secret key k_t.  Using s_t in place of t should be fine here, since the security proof only relies on the reduction knowing s_t.
     12I only see one place t is used other than in the derivation of s_t, in the derivation of the symmetric key k_t.  Using s_t in place of t should be fine here, since the security proof only relies on the reduction knowing s_t.
    1313
    1414