___________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.

A. Prime curve
B. Elliptic curve cryptography(ECC)
C. abelian group
D. Micali-Schnorr

B. Elliptic curve cryptography(ECC)

Computer Science & Information Technology

You might also like to view...

Match the following common problems associated with e-mail to the symptoms listed:

I. delivery failure II. attachment won't open III. missed messages IV. hasty response V. misinterpretation A. file was corrupted during transfer B. user's inbox is at the mailbox size limit C. use of too much humor or sarcasm D. message was sent out but the user did not receive the message E. quick response without much thought

Computer Science & Information Technology

The ____________________ set of statements detects exceptions and takes corrective action.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology