From 04df97cfedab08c4d37e511ed2a6c31bcd31e4b3 Mon Sep 17 00:00:00 2001 From: Jean-Philippe Aumasson Date: Mon, 11 Jan 2021 22:11:48 +0100 Subject: formatting --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 5b8ecd1..2651bdd 100644 --- a/README.md +++ b/README.md @@ -49,11 +49,11 @@ security for any function with the same key and output size. The standard PRF security goal allow the attacker access to the output of SipHash on messages chosen adaptively by the attacker. Security is limited by the key size (128 bits). -Attackers searching 2s keys have chance 2sāˆ’128 of finding +Attackers searching 2*s* keys have chance 2*s*āˆ’128 of finding the SipHash key. Security is also limited by the output size. In particular, when -SipHash is used as a MAC, an attacker who blindly tries 2s tags will -succeed with probability 2s-t, if t is that tag's bit size. +SipHash is used as a MAC, an attacker who blindly tries 2*s* tags will +succeed with probability 2*s*-*t*, if *t* is that tag's bit size. ## Research -- cgit v1.2.3