Search results for computer+network-security

0 votes
0 answers
3
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. If user A as public key YA=9 what is as private key XA? If user B has public key YB= 3...
0 votes
0 answers
7
1 votes
2 answers
11
2 votes
4 answers
12
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
1 votes
2 answers
18
0 votes
1 answer
19