1What is the difference between an index and a discrete logarithm?
2What are the principal elements of a public-key cryptosystem?
3What are the roles of the public and private key?
4What are three broad categories of applications of public-key cryptosystems?
5What requirements must a public-key cryptosystems fulfill to be a secure algorithm?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here