MCQOPTIONS
Saved Bookmarks
| 1. |
If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient. |
| A. | True |
| B. | False |
| Answer» C. | |