Return to Article Details Advanced cryptographic technique that can render data futile during data breach Download Download PDF