Been wondering about this harder version. If it’s simple to state or link, would appreciate it.

I have a vague sense that n+1 txns using a polynomial would likely leak a key, but can’t see how a complex permutation of the scalar field could be cracked without knowing some properties about it. Quick google didn’t yield any results

Reply to this note

Please Login to reply.

Discussion

No replies yet.