1
See
handout 15
for further results on the security of
BBS
.