3

If I want to prove my protocol is secure, can I just use a game based approach and/or a simulator approach? Or are there other common approaches?

WeCanBeFriends
  • 1,303
  • 11
  • 20

0 Answers0