Diffie-Hellman’s key-exchange method runs this kind of exponentiation protocol, with all the operations conducted in this way ...
Following the lead you received from Vander at Mt. Battle about suspicious activity in an abandoned lab in the desert, you ...