- 2.1
-
Not to be confused with what is usually called a Trojan horse
attack in computer security.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 3.1
-
Sometimes convex is called
convex- and concave is called convex-.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 4.1
-
Note that if the only channel available can only transmit
bits, the value must be rounded up to the nearest whole bit.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 4.2
-
L'Hospital is nowadays often spelled l'Hôpital.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 4.3
-
This was published in 1948. Information storage has evolved
quite a bit since.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 5.1
-
Often called Message Authentication
Code, MAC.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 5.2
-
In the case of digital signatures, Bob can validate the tag
but he can not compute it before he has seen it. With
symmetrical message authentication Bob can both calculate and
validate the tag.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 5.3
-
Many other functions than XOR will also work, but XOR is
normally used in examples.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 5.4
-
They are sometimes called classes
or sets instead of families.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- 5.5
-
Polynomials of higher degree are also possible and usable.
When allowing all polynomials of degree less than
a strongly
universal family is created.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.