system security
k = 5. Puzzle B: Four sub-puzzles. k = 3. You should provide, for both cases other than part (b), the following: (a) The distribution of the number of cases that require each number of hashes. (b) Explain the method you used to obtain your distributions. Don’t go into too many details or show working, […]
Read More »