How does precomputation help when attacking encrypted data?
a. Precomputation uses data from previous breaches to attempt known keys.
b. Precomputation gives no speed advantage, but instead builds a verified list of known mathematical proofs.
c. Precomputation takes advantage of attack methods that allow for a computation to be run once and used repeatedly later.
d. Precomputation doesn't ever offer help when attacking an encrypted function.