To create a __________ a user calculates two quantities, r and s, that are functions of the public key components (p, q, g), the user's private key (x), the hash code of the message H(M), and an additional integer k that should be generated randomly or pseudorandomly and be unique for each signing.

A. signature
B. hash authentication
C. secret key
D. global key


A. signature

Computer Science & Information Technology

You might also like to view...

The estimated costs for attaining a given level in the SAMM is provided within the model. How are these costs estimated?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is the correct way to declare a variable that represents if an order has been canceled?

BOOLEAN canceled = false; boolean canceled = false; boolean CANCELED = false; boolean canceled = FALSE;

Computer Science & Information Technology

A UTP certification report lists the following.


What do these results indicate?
a. The cable fails the certification test.
b. Pairs 3–6 and 7–8 will be certified.
c. Pairs 1–2 and 4–5 will be certified.
d. The cable has passed the certification test.
e. The ! sign indicates that the cable pair meets or exceeds power sum test criteria.

Computer Science & Information Technology

A ________ is a text box and a list that is hidden until you click its arrow

A) combo box B) results box C) lookup field D) bracket box

Computer Science & Information Technology