The __________ encryption scheme is designed to enable encryption by a user's public key with decryption by the user's private key.

Fill in the blank(s) with the appropriate word(s).


ElGamal

Computer Science & Information Technology

You might also like to view...

The Open Data Center Alliance (ODCA) lists ________ as principal requirements for a modern networking approach.

A) Maintainability, vendor dependence, and adaptability B) Vendor dependence, automation, and mobility C) Adaptability, integrated security, and on-demand scaling D) Model management, vendor dependence, and integrated security

Computer Science & Information Technology

________ counteracts camera shake and allows you to take sharper images

A) Shutter lag B) Fixed-focus C) Burst mode D) Image stabilization

Computer Science & Information Technology

Using two keys in combination to perform an action is known as a(n) ________

A) quick method B) quick key C) keyboard cheat D) keyboard shortcut

Computer Science & Information Technology

Using ________ orientation causes the document to have a page width greater than its page height

A) landscape B) portrait C) justified D) paragraph

Computer Science & Information Technology