The most widely used public-key cryptosystem is __________ .
A. optimal asymmetric encryption
B. asymmetric encryption
C. RSA
D. DES
C. RSA
Computer Science & Information Technology
You might also like to view...
________ software requires the user to pay a fee for it
Fill in the blank(s) with correct word
Computer Science & Information Technology
A character array terminated with the null character is most correctly called
a. a c-string b. a character array c. a string d. none of the above
Computer Science & Information Technology