Report copyright - arXiv:1902.02332v2 [quant-ph] 7 Feb 20193 II. METHODOLOGY A. Symmetric cryptography and hash functions The methodology, sketched in Fig.1and Fig.2, follows the same lines as the one
Please pass captcha verification before submit form