The effort required for a collision resistant attack is explained by a mathematical result referred to as the ___________ .

A. Whirlpool
B. birthday paradox
C. hash value
D. message authentication code


B. birthday paradox

Computer Science & Information Technology

You might also like to view...

Which of the following does the Microsoft Agent ActiveX control not support?

a) character animation b) voice command recognition c) text support d) VRML support

Computer Science & Information Technology

____ are positive and negative numbers and 0 with no decimal places.

A. Integers B. Numbers C. Digits

Computer Science & Information Technology

The PROPER function  replaces existing text with new text.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What can be used as a type of "fingerprint" for an object, due to the fact that it is unique?

A. property B. hash code C. derived code D. new property

Computer Science & Information Technology