summaryrefslogtreecommitdiff
path: root/content/introduction.tex
diff options
context:
space:
mode:
authorDennis Brentjes <d.brentjes@gmail.com>2017-06-05 09:45:31 +0200
committerDennis Brentjes <d.brentjes@gmail.com>2017-06-05 09:45:31 +0200
commit5482f6b544fa91273ec983892681b6c67e59e825 (patch)
treed2a1de44153deef445508249eceb807cafa518a0 /content/introduction.tex
parent33483109b741824e163210acfda07dfa96876cc9 (diff)
downloadthesis-5482f6b544fa91273ec983892681b6c67e59e825.tar.gz
thesis-5482f6b544fa91273ec983892681b6c67e59e825.tar.bz2
thesis-5482f6b544fa91273ec983892681b6c67e59e825.zip
Minor fixes for readability.
Diffstat (limited to 'content/introduction.tex')
-rw-r--r--content/introduction.tex4
1 files changed, 2 insertions, 2 deletions
diff --git a/content/introduction.tex b/content/introduction.tex
index aa1ec2a..ebb45fe 100644
--- a/content/introduction.tex
+++ b/content/introduction.tex
@@ -1,5 +1,5 @@
\section{Introduction}
-Showing that one piece of software is faster than another is somewhat of an art. Trying to keep as many of the variables the same while varying the one you are interested in is not easy. Especially when the implementations are not of the same algorithm. This is the case for the \cmix mix network. The only condition for the underlying cryptography is that it is ElGamal based. This means that both multiplicative groups and elliptic curves are valid implementations. This makes benchmarking the fundamental performance differences between these two difficult. This paper and companion framework implementation focuses on providing a fair comparison by between the two, by providing a common interface.
+Showing that one piece of software is faster than another is somewhat of an art. Trying to keep as many of the variables the same while varying the one you are interested in is not easy. Especially when the implementations are not of the same algorithm. This is the case for the \cmix mix network. The only condition for the underlying cryptography is, that it is ElGamal based. This means that both multiplicative groups and elliptic curves are valid implementations. Making benchmarking the fundamental performance differences between these two difficult and interesting. This paper and companion framework implementation focuses on providing a fair comparison by between the two, by providing a common interface. Included with 2 basic implementations with the same cryptographic library.
-Section \ref{sec:cmix} will talk about the \cmix network and how it works and why it works with ElGamal. Followed by \ref{sec:implementation}; which talks about some implementation specific things. Section \ref{sec:cmixaddtions} will talk about some flaws in the original \cmix protocol and discusses the fix to them. Then we talk about the results in section \ref{sec:results}, followed by the discussion of the results in section \ref{sec:discussion}. Final thought and further research ideas are in the conclusion section \ref{sec:conclusion}. \ No newline at end of file
+The paper is structured as follows. Section \ref{sec:cmix} will talk about the \cmix network and how it works and why it works with ElGamal. Followed by \ref{sec:implementation}; which talks about some implementation specific things. Section \ref{sec:cmixaddtions} will talk about some flaws in the original \cmix protocol and discusses the fix to them. Then we talk about the results in section \ref{sec:results}, followed by the discussion of the results in section \ref{sec:discussion}. Final thought and further research ideas are in the conclusion section \ref{sec:conclusion}. \ No newline at end of file