Multiple Choice
the ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.
A) Micali-Schnorr
B) Elgamal-Fraiser
C) Diffie-Hellman
D) Miller-Rabin
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q11: For purposes of ECC, elliptic curve arithmetic
Q12: the key exchange protocol vulnerability can be
Q13: Eq(a,b) is an elliptic curve with parameters
Q14: A(n) _ is defined by an equation
Q15: the fastest known technique for taking the
Q17: the Diffie-Hellman key exchange formula for calculation
Q18: If three points on an elliptic curve
Q19: ECC is fundamentally easier to explain than
Q20: Elliptic curves are ellipses.
Q21: to form a cryptographic system using _