Question 72 An error correcting code has the following code words: 00000000, 00001111, 01010101, 10101010, 11110000. What is the maximum number of bit errors that can […]
Question 76 Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of […]
Question 77 Consider the following two statements: (i) A hash function (these are often used for computing digital signatures) is an injective function. (ii) An encryption […]