__________ can be used to develop a variety of elliptic curve cryptography schemes.
A. Elliptic curve arithmetic
B. Binary curve
C. Prime curve
D. Cubic equation
A. Elliptic curve arithmetic
Computer Science & Information Technology
You might also like to view...
Match the following terms to their meanings:
I. Cell II. Spreadsheet III. Range IV. Workbook V. Worksheet A. An Excel file containing one or more worksheets B. The primary document in Excel to save work with data C. Another name for a worksheet in Excel D. The small box formed by the intersection of a column and row E. Two or more selected cells that can be treated as a single unit
Computer Science & Information Technology
An attack that takes place shortly after a security hole is publicized, with no downloadable patch available, is called a(n):
A) zero-time exploit B) zero-patch exploit C) zero-hour exploit D) zero-day exploit
Computer Science & Information Technology