The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.

A. Micali-Schnorr
B. Elgamal-Fraiser
C. Diffie-Hellman
D. Miller-Rabin


C. Diffie-Hellman

Computer Science & Information Technology

You might also like to view...

________ is a technique that involves breaking a program into logical segments and keeping only the currently needed segment in memory at any one time.

a) Caching b) Swapping c) Dynamic programming d) Creating overlays

Computer Science & Information Technology

After creating a new database from Blank desktop database, Access opens a blank table named Table1

Indicate whether the statement is true or false

Computer Science & Information Technology

Open-source tools, like PhoneGap, are free to buy and use.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A network ________ is another name for a network interface card

Fill in the blank(s) with correct word

Computer Science & Information Technology