Friday, September 30, 2011

Lecture 5

Implications of  indistinguishable encryptions in the presence of an eavesdropper.
Textbook Section 3.2.2

No comments:

Post a Comment