Microsoft Revenge of Arcade
Microsoft Revenge of Arcade is a video game compilation developed and published by Microsoft for the PC.
Microsoft Revenge of Arcade | |
---|---|
Developer(s) | Microsoft |
Publisher(s) | Microsoft |
Platform(s) | Microsoft Windows |
Release |
|
Genre(s) | Arcade game |
Mode(s) | Single player, multiplayer |
Gameplay
Microsoft Revenge of Arcade includes the games Ms. Pac-Man, Xevious, Mappy, Rally-X, and Motos.[1]
Reception
Next Generation reviewed the PC version of the game, rating it one star out of five, and stated that "(with the exception of Mrs. Pac-Man) all these games are sort of past their sell-by date, and you have an unmitigated disaster, callously cashing in on people's misremembered childhood memories."[1]
Reviews
- PC Gamer Vol. 5 No. 10 (1998 October)
- Computer Gaming World #173 (Dec 1998)
- Computer Games Magazine - Oct 25, 1998
- Power Unlimited - Dec, 1998
- PC Player (Germany) - Sep, 1998
- PC Games - Nov, 1998
gollark: <@151391317740486657> Do you know what "unsupported" means? PotatOS is not designed to be used this way.
gollark: Specifically, 22 bytes for the private key and 21 for the public key on ccecc.py and 25 and 32 on the actual ingame one.
gollark: <@!206233133228490752> Sorry to bother you, but keypairs generated by `ccecc.py` and the ECC library in use in potatOS appear to have different-length private and public keys, which is a problem.EDIT: okay, apparently it's because I've been accidentally using a *different* ECC thing from SMT or something, and it has these parameters instead:```---- Elliptic Curve Arithmetic---- About the Curve Itself-- Field Size: 192 bits-- Field Modulus (p): 65533 * 2^176 + 3-- Equation: x^2 + y^2 = 1 + 108 * x^2 * y^2-- Parameters: Edwards Curve with c = 1, and d = 108-- Curve Order (n): 4 * 1569203598118192102418711808268118358122924911136798015831-- Cofactor (h): 4-- Generator Order (q): 1569203598118192102418711808268118358122924911136798015831---- About the Curve's Security-- Current best attack security: 94.822 bits (Pollard's Rho)-- Rho Security: log2(0.884 * sqrt(q)) = 94.822-- Transfer Security? Yes: p ~= q; k > 20-- Field Discriminant Security? Yes: t = 67602300638727286331433024168; s = 2^2; |D| = 5134296629560551493299993292204775496868940529592107064435 > 2^100-- Rigidity? A little, the parameters are somewhat small.-- XZ/YZ Ladder Security? No: Single coordinate ladders are insecure, so they can't be used.-- Small Subgroup Security? Yes: Secret keys are calculated modulo 4q.-- Invalid Curve Security? Yes: Any point to be multiplied is checked beforehand.-- Invalid Curve Twist Security? No: The curve is not protected against single coordinate ladder attacks, so don't use them.-- Completeness? Yes: The curve is an Edwards Curve with non-square d and square a, so the curve is complete.-- Indistinguishability? No: The curve does not support indistinguishability maps.```so I might just have to ship *two* versions to keep compatibility with old signatures.
gollark: > 2. precompilation to lua bytecode and compressionThis was considered, but the furthest I went was having some programs compressed on disk.
gollark: > 1. multiple layers of sandboxing (a "system" layer that implements a few things, a "features" layer that implements most of potatOS's inter-sandboxing API and some features, a "process manager" layer which has inter-process separation and ways for processes to communicate, and a "BIOS" layer that implements features like PotatoBIOS)Seems impractical, although it probably *could* fix a lot of problems
References
- "Finals". Next Generation. No. 48. Imagine Media. December 1998. p. 136.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.