Introduction to Cryptography
Northwestern EECS 395/495-0-21 Fall 2011
Friday, September 30, 2011
Lecture 5
Implications of indistinguishable encryptions in the presence of an eavesdropper.
Textbook Section 3.2.2
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment