Elliptic curve cryptography and the _________ are two cryptographic algorithms that rely heavily on properties of finite fields.

Fill in the blank(s) with the appropriate word(s).

Advanced Encryption Standard (AES)

Computer Science & Information Technology

You might also like to view...

Which item is not part of the primary security categories?

A. Encryption B. Detection C. Recovery D. Prevention

Computer Science & Information Technology

?____ is a Trojan horse designed and used to make a horde of zombies to do the hacker's bidding.

A. ?NetBus B. ?Pretty Park C. ?BO2K D. ?AIDS

Computer Science & Information Technology