CEH: Cryptographic Attacks and De...
Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 10
1. Which public key encryption method is based on the difficulty in solving discrete logarithms problems using curves over finite fields, with efficient usage of processing power and can thus be used in cell phones/PDAs:
Elliptic Curve Cryptosystem (ECC)