Elliptic curve cryptography and the _________ are two cryptographic algorithms that rely heavily on properties of finite fields.
Fill in the blank(s) with the appropriate word(s).
Advanced Encryption Standard (AES)
Computer Science & Information Technology
You might also like to view...
Which item is not part of the primary security categories?
A. Encryption B. Detection C. Recovery D. Prevention
Computer Science & Information Technology
?____ is a Trojan horse designed and used to make a horde of zombies to do the hacker's bidding.
A. ?NetBus B. ?Pretty Park C. ?BO2K D. ?AIDS
Computer Science & Information Technology