“…The demand for privacy of digital data and of algorithms for handling more complex structures have increased exponentially over the last decade. This goes in parallel with the growth in communication networks and their devices and their increasing capabilities (Sen, 2013a;Sen, 2012d;Sen, 2012c;Bandyopadhyay & Sen, 2011;Sen, 2011b;Sen, 2011c;Sen, 2010c). At the same time, these devices and networks are subject to a great variety of attacks involving manipulation and destruction of data and theft of sensitive information (Sen, 2013b;Sen, 2012e;Sen, 2011d;Sen, 2010d;Sen et al, 2007a;Sen et al, 2007b;Sen et al, 2007c;Sen et al, 2006).…”