To counter attacks such as CCAs, RSA Security, Inc. recommends modifying the plaintext using a procedure known as ___________ .

Fill in the blank(s) with the appropriate word(s).

optimal asymmetric encryption padding (OAEP)

Computer Science & Information Technology

You might also like to view...

When a formula is copied to another cell, the cell reference changes based on the new location of the formula is a(n) ________ cell reference

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is spyware and how does it operate?

What will be an ideal response?

Computer Science & Information Technology