The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q, and the ____ problem.
A. RSA
B. ElGamal
C. Diffie-Hellman
D. discrete logarithm
Answer: A
Computer Science & Information Technology
You might also like to view...
Which of the following is most closely associated with the statement, "Occurs for a given node when a drag operation that started in a different node continues over the given node."
a. onMouseDragEntered b. onMouseDragExited c. onMouseDragged d. onMouseDragOver
Computer Science & Information Technology
The UNIX and Linux operating systems comprise a growing segment in the operating systems market.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Panel ____ organize related panels.
a. collections b. groups c. bars d. layers
Computer Science & Information Technology
What is meant by the OLAP term "consolidation"?
What will be an ideal response?
Computer Science & Information Technology