Frage zu Artikel "Computation, Cryptography, and Network Security"