Complexity in crypto
Which of the following best describes how computational complexity is used in cryptography?
This exercise is part of the course
Concepts in Computer Science
Hands-on interactive exercise
Turn theory into action with one of our interactive exercises
