Two families of elliptic curves are used in cryptographic applications: prime curves over Zp and __________ over GF(2m).

Fill in the blank(s) with the appropriate word(s).

binary curves

Computer Science & Information Technology

You might also like to view...

The duplication of data in a database is called data ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

(Craps Game Modification) Modify the program of Fig. 5.10 to play 1000 games of craps. The program should keep track of the statistics and answer the following questions:

a) How many games are won on the 1st roll, 2nd roll, ..., 20th roll, and after the 20th roll? b) How many games are lost on the 1st roll, 2nd roll, ..., 20th roll, and after the 20th roll? c) What are the chances of winning at craps? [Note: You should discover that craps is one of the fairest casino games. What do you suppose this means?] d) What is the average length of a game of craps? e) Do the chances of winning improve with the length of the game?

Computer Science & Information Technology