This is the study of using randomness to enhance the security of cryptographic protocols. Examples include probabilistic encryption and randomized hash functions.
This is the study of using randomness to enhance the security of cryptographic protocols. Examples include probabilistic encryption and randomized hash functions.