___________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.

A. Prime curve
B. Elliptic curve cryptography(ECC)
C. abelian group
D. Micali-Schnorr


B. Elliptic curve cryptography(ECC)

Computer Science & Information Technology

You might also like to view...

Files exist on devices such as hard disks, USB drives, reels of magnetic tape, and optical discs. What are these files considered to be?

A. temporary files B. volatile files C. soft files D. permanent files

Computer Science & Information Technology

What process represents the Windows kernel and system process on a running Windows 2016 Server installation?

A. lsass.exe B. NtKrnl C. kernel.exe D. System

Computer Science & Information Technology

A(n) ____ is like a noun: It is a person, place, thing, or event.

A. record B. tuple C. entity D. attribute

Computer Science & Information Technology

The _______________menu in the Buttons and Forms panel offers six basic controls that you can apply to buttons such as Play, Pause, Stop, and Resume.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology