__________ can be used to develop a variety of elliptic curve cryptography schemes.

A. Elliptic curve arithmetic
B. Binary curve
C. Prime curve
D. Cubic equation

A. Elliptic curve arithmetic

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Cell II. Spreadsheet III. Range IV. Workbook V. Worksheet A. An Excel file containing one or more worksheets B. The primary document in Excel to save work with data C. Another name for a worksheet in Excel D. The small box formed by the intersection of a column and row E. Two or more selected cells that can be treated as a single unit

Computer Science & Information Technology

An attack that takes place shortly after a security hole is publicized, with no downloadable patch available, is called a(n):

A) zero-time exploit B) zero-patch exploit C) zero-hour exploit D) zero-day exploit

Computer Science & Information Technology