People also search for
Indistinguishability obfuscationPseudorandom permutationIdentical particlesPseudorandom function familyIdentity of indiscerniblesPerfect hash functionDeterministic encryptionPseudorandom generatorSymmetric-key algorithmNp-intermediateComputational hardness assumptionSemantic security
View more related searches