

MCQOPTIONS
Saved Bookmarks
1. |
If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient. |
A. | True |
B. | False |
Answer» C. | |