. "where c is a predetermined constant that depends on the application and level of security desired (e.g., c=4)." . . .