- ...Security
- Supported by
the U.S. Department of Defense
Advanced Research Projects Agency and the U.S. Air Force
Rome Laboratory under contract F30602-95-1-0046.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...certainty
- A one time pad is provably secure, this is an exception.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...function
- The term
hash-data is used loosely to refer to the data that is covered by an
authentication transform which is not required to be a hash function.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.