| http://www.w3.org/ns/prov#value | - I am especially wondering if I am just stating the obvious by associating the attacks with their original crypto-systems or if there are methods that work for different kinds of systems based on different math theory (an example of this would really be helpful).
|