The cr.yp.to microblog: 2011.12.29 11:38:58

2011.12.29 11:38:58 (152337809527668736) from Daniel J. Bernstein, replying to "Alexander Klink (@alech)" (152070477202984961):

@alech Most hash-randomization methods are bogus. The most sophisticated code I've seen isn't bogus but is still broken by a timing attack.

Context

2011.12.28 17:54:55 (152070032908750851) from Daniel J. Bernstein:

Don't believe people who claim that you can stop #hashflooding by changing, or randomizing, your hash function.

2011.12.28 17:56:41 (152070477202984961) from "Alexander Klink (@alech)":

@hashbreaker Oh, interesting, why do you believe randomizing is not a solution?