Future Work

From 2008.igem.org

(Difference between revisions)
 
Line 5: Line 5:
*Research methods of attack of hash models (Nostradamus Attack)
*Research methods of attack of hash models (Nostradamus Attack)
-
*Development of more “ideal” hash function models (that cab be computed by bacteria)
+
*Development of more “ideal” hash function models (that can be computed by bacteria)
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home]
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home]

Latest revision as of 22:07, 27 October 2008

  • Development of more analysis tests to identify collision patterns
  • Further analysis of models
  • Research methods of attack of hash models (Nostradamus Attack)
  • Development of more “ideal” hash function models (that can be computed by bacteria)